<?xml version='1.0' encoding='UTF-8'?>
<nvd xmlns:cpe-lang="http://cpe.mitre.org/language/2.0" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/0.1" xmlns:cvss="http://scap.nist.gov/schema/cvss-v2/0.2" xmlns:vuln="http://scap.nist.gov/schema/vulnerability/0.4" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://scap.nist.gov/schema/feed/vulnerability/2.0" xmlns:patch="http://scap.nist.gov/schema/patch/0.1" nvd_xml_version="2.0" pub_date="2019-10-11T04:24:19" xsi:schemaLocation="http://scap.nist.gov/schema/patch/0.1 https://scap.nist.gov/schema/nvd/patch_0.1.xsd http://scap.nist.gov/schema/feed/vulnerability/2.0 https://scap.nist.gov/schema/nvd/nvd-cve-feed_2.0.xsd http://scap.nist.gov/schema/scap-core/0.1 https://scap.nist.gov/schema/nvd/scap-core_0.1.xsd">
  <entry id="CVE-2009-0001">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0001</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6135" name="oval:org.mitre.oval:def:6135"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33385" xml:lang="en">33385</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48154" xml:lang="en">quicktime-rtspurl-bo(48154)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted RTSP URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0002">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0002</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5646" name="oval:org.mitre.oval:def:5646"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0210.html" xml:lang="en">20090121 ZDI-09-005: Apple QuickTime VR Track Header Atom Heap Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33384" xml:lang="en">33384</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-005/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-005/</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QTVR movie file with crafted THKD atoms.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0003">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0003</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6218" name="oval:org.mitre.oval:def:6218"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33387" xml:lang="en">33387</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-006/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-006/</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via an AVI movie file with an invalid nBlockAlign value in the _WAVEFORMATEX structure.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0004">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0004</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6211" name="oval:org.mitre.oval:def:6211"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48157" xml:lang="en">quicktime-mpeg2-bo(48157)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted MP3 audio file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0005">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.9"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0005</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6187" name="oval:org.mitre.oval:def:6187"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33386" xml:lang="en">33386</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48158" xml:lang="en">quicktime-h263-movie-code-execution(48158)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted H.263 encoded movie file that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0006">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0006</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:39.193-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6153" name="oval:org.mitre.oval:def:6153"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0215.html" xml:lang="en">20090121 ZDI-09-007: Apple QuickTime Cinepak Codec MDAT Heap Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500391/100/0/threaded" xml:lang="en">20090124 Re: ZDI-09-007: Apple QuickTime Cinepak Codec MDAT Heap Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33388" xml:lang="en">33388</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-007/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-007/</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a Cinepak encoded movie file with a crafted MDAT atom that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0007">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0007</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:34.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6132" name="oval:org.mitre.oval:def:6132"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jan/msg00000.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3403" xml:lang="en">http://support.apple.com/kb/HT3403</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33390" xml:lang="en">33390</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-022A.html" xml:lang="en">TA09-022A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0212" xml:lang="en">ADV-2009-0212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-008/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-008/</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QuickTime movie file containing invalid image width data in JPEG atoms within STSD atoms.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0008">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:quicktime_mpeg-2_playback_component"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime_mpeg-2_playback_component</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0008</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T13:30:03.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:34.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5974" name="oval:org.mitre.oval:def:5974"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce//2009/Jan/msg00001.html" xml:lang="en">APPLE-SA-2009-01-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3404" xml:lang="en">http://support.apple.com/kb/HT3404</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33393" xml:lang="en">33393</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021621" xml:lang="en">1021621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0211" xml:lang="en">ADV-2009-0211</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48162" xml:lang="en">quicktime-mpeg2playback-code-execution(48162)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Apple QuickTime MPEG-2 Playback Component before 7.60.92.0 on Windows allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via a crafted MPEG-2 movie.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0009">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0009</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:00.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:45.737-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/alerts/2009/Feb/1021718.html" xml:lang="en">1021718</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48713" xml:lang="en">macosx-pixlet-codec-code-execution(48713)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Pixlet codec in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted movie file that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0010">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0010</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:40.320-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html" xml:lang="en">APPLE-SA-2009-06-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3591" xml:lang="en">http://support.apple.com/kb/HT3591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503878/100/0/threaded" xml:lang="en">20090527 ZDI-09-021: Apple QuickTime PICT Unspecified Tag Heap Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34938" xml:lang="en">34938</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022209" xml:lang="en">1022209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1407" xml:lang="en">ADV-2009-1407</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.vupen.com/exploits/Apple_QuickTime_PICT_Poly_Tag_Parsing_Heap_Overflow_PoC_Exploit_1407144.php" xml:lang="en">http://www.vupen.com/exploits/Apple_QuickTime_PICT_Poly_Tag_Parsing_Heap_Overflow_PoC_Exploit_1407144.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-021" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-021</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-021/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-021/</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, and Apple QuickTime before 7.6.2, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PICT image with a crafted 0x77 Poly tag and a crafted length field, which triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0011">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0011</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:45.797-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/alerts/2009/Feb/1021720.html" xml:lang="en">1021720</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48715" xml:lang="en">macosx-certificate-asst-file-overwrite(48715)</vuln:reference>
    </vuln:references>
    <vuln:summary>Certificate Assistant in Apple Mac OS X 10.5.6 allows local users to overwrite arbitrary files via unknown vectors related to an "insecure file operation" on a temporary file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0012">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0012</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-13T10:10:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33809" xml:lang="en">33809</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in CoreText in Apple Mac OS X 10.5.6 allows remote attackers to execute arbitrary code via a crafted Unicode string.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0013">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0013</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:45.843-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/alerts/2009/Feb/1021722.html" xml:lang="en">1021722</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33815" xml:lang="en">33815</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48717" xml:lang="en">macosx-dstools-information-disclosure(48717)</vuln:reference>
    </vuln:references>
    <vuln:summary>dscl in DS Tools in Apple Mac OS X 10.4.11 and 10.5.6 requires that passwords must be provided as command line arguments, which allows local users to gain privileges by listing process information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0014">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0014</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:45.610-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33820" xml:lang="en">33820</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Folder Manager in Apple Mac OS X 10.5.6 uses insecure default permissions when recreating a Downloads folder after it has been deleted, which allows local users to bypass intended access restrictions and read the Downloads folder.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0015">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0015</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:45.720-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33821" xml:lang="en">33821</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in fseventsd in the FSEvents framework in Apple Mac OS X 10.5.6 allows local users to obtain sensitive information (filesystem activities and directory names) via unknown vectors related to "credential management."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0016">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:1.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:1.1.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:1.1.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:2.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:2.0.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:2.0.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:2.0.3::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:2.0.4::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:3.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:3.0.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.72::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1.30::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1::windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1:-:windows"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0::windows"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:1.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:1.1.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:1.1.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:2.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:2.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:2.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:2.0.3::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:2.0.4::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:3.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:3.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.72::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1.30::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0::windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0016</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:41.803-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6001" name="oval:org.mitre.oval:def:6001"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-03/0236.html" xml:lang="en">20090312 Apple iTunes DAAP Messages Handling Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce//2009/Mar/msg00001.html" xml:lang="en">APPLE-SA-2009-03-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021842" xml:lang="en">1021842</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3487" xml:lang="en">http://support.apple.com/kb/HT3487</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguardcenter.com/advisory/FGA-2009-11.html" xml:lang="en">http://www.fortiguardcenter.com/advisory/FGA-2009-11.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501758/100/0/threaded" xml:lang="en">20090313 Apple iTunes DAAP Messages Handling Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34094" xml:lang="en">34094</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0702" xml:lang="en">ADV-2009-0702</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49200" xml:lang="en">itunes-daap-dos(49200)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple iTunes before 8.1 on Windows allows remote attackers to cause a denial of service (infinite loop) via a Digital Audio Access Protocol (DAAP) message with a crafted Content-Length header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0017">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0017</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:45.923-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33811" xml:lang="en">33811</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>csregprinter in the Printing component in Apple Mac OS X 10.4.11 and 10.5.6 does not properly handle error conditions, which allows local users to execute arbitrary code via unknown vectors that trigger a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0018">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0018</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:46.017-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33816" xml:lang="en">33816</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>The Remote Apple Events server in Apple Mac OS X 10.4.11 and 10.5.6 does not properly initialize a buffer, which allows remote attackers to read portions of memory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0019">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0019</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:46.127-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33814" xml:lang="en">33814</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Remote Apple Events in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) or obtain sensitive information via unspecified vectors that trigger an out-of-bounds memory access.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0020">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0020</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:04.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:46.203-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in CarbonCore in Apple Mac OS X 10.4.11 and 10.5.6 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via a crafted resource fork that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0021">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p1"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p3"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ntp:ntp:4.2.0</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p1</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p3</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0021</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T12:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:43.337-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10035" name="oval:org.mitre.oval:def:10035"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" xml:lang="en">SUSE-SR:2009:008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.531177" xml:lang="en">SSA:2009-014-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0046.html" xml:lang="en">RHSA-2009:0046</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021533" xml:lang="en">1021533</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0042" xml:lang="en">ADV-2009-0042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.ntp.org/pipermail/announce/2009-January/000055.html" xml:lang="en">[announce] 20090108 NTP 4.2.4p6 Released</vuln:reference>
    </vuln:references>
    <vuln:summary>NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0022">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:samba:samba:3.2.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:samba:samba:3.2.0</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.1</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.2</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.3</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.4</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.5</vuln:product>
      <vuln:product>cpe:/a:samba:samba:3.2.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0022</vuln:cve-id>
    <vuln:published-datetime>2009-01-05T15:30:02.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:57:40.737-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch" xml:lang="en">http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:042" xml:lang="en">MDVSA-2009:042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.samba.org/samba/security/CVE-2009-0022.html" xml:lang="en">http://www.samba.org/samba/security/CVE-2009-0022.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33118" xml:lang="en">33118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021513" xml:lang="en">1021513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0017" xml:lang="en">ADV-2009-0017</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47733" xml:lang="en">samba-file-system-security-bypass(47733)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/702-1/" xml:lang="en">USN-702-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html" xml:lang="en">FEDORA-2009-0268</vuln:reference>
    </vuln:references>
    <vuln:summary>Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0023">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:apr-util:1.3.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:apr-util:0.9.1</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:0.9.2</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:0.9.3</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:0.9.4</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:0.9.5</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.0</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apache:apr-util:1.3.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0023</vuln:cve-id>
    <vuln:published-datetime>2009-06-07T21:00:00.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:45.287-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10968" name="oval:org.mitre.oval:def:10968"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12321" name="oval:org.mitre.oval:def:12321"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html" xml:lang="en">APPLE-SA-2009-11-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129190899612998&amp;w=2" xml:lang="en">HPSBUX02612</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-03.xml" xml:lang="en">GLSA-200907-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.538210" xml:lang="en">SSA:2009-167-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3937" xml:lang="en">http://support.apple.com/kb/HT3937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?view=rev&amp;revision=779880" xml:lang="en">http://svn.apache.org/viewvc?view=rev&amp;revision=779880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0144" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3" xml:lang="en">http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1812" xml:lang="en">DSA-1812</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:131" xml:lang="en">MDVSA-2009:131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" xml:lang="en">MDVSA-2013:150</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1107.html" xml:lang="en">RHSA-2009:1107</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1108.html" xml:lang="en">RHSA-2009:1108</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507855/100/0/threaded" xml:lang="en">20091112 rPSA-2009-0144-1 apr-util</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35221" xml:lang="en">35221</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-786-1" xml:lang="en">USN-786-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-787-1" xml:lang="en">USN-787-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1907" xml:lang="en">ADV-2009-1907</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3184" xml:lang="en">ADV-2009-3184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341" xml:lang="en">PK88341</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241" xml:lang="en">PK91241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478" xml:lang="en">PK99478</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=503928" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=503928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50964" xml:lang="en">apache-aprstrmatchprecompile-dos(50964)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" xml:lang="en">[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" xml:lang="en">[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html" xml:lang="en">FEDORA-2009-6014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html" xml:lang="en">FEDORA-2009-6261</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html" xml:lang="en">FEDORA-2009-5969</vuln:reference>
    </vuln:references>
    <vuln:summary>The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0024">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0024</vuln:cve-id>
    <vuln:published-datetime>2009-01-13T12:00:01.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-03-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-13T14:16:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.24.y.git;a=commit;h=8a459e44ad837018ea5c34a9efe8eb4ad27ded26" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.24.y.git;a=commit;h=8a459e44ad837018ea5c34a9efe8eb4ad27ded26</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/1" xml:lang="en">[oss-security] 20090112 CVE-2009-0024 kernel: local privilege escalation in sys_remap_file_pages</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33211" xml:lang="en">33211</vuln:reference>
    </vuln:references>
    <vuln:summary>The sys_remap_file_pages function in mm/fremap.c in the Linux kernel before 2.6.24.1 allows local users to cause a denial of service or gain privileges via unspecified vectors, related to the vm_file structure member, and the mmap_region and do_munmap functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0025">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1:rc7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:a3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc10"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc8"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0:rc9"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2:p3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4:rc8"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.5:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.7:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.7:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:bind:9.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.0:rc6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.1:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1:rc7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.2:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.3:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.3:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.3:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:a2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:a3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc10</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc8</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0:rc9</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.1:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2:p3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3:rc4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4:rc8</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.5:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.5:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.6:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.7:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.7:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.7:rc3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0025</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T12:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:51.383-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10879" name="oval:org.mitre.oval:def:10879"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5569" name="oval:org.mitre.oval:def:5569"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33" xml:lang="en">http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=141879471518471&amp;w=2" xml:lang="en">HPSBOV03226</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FREEBSD</vuln:source>
      <vuln:reference href="http://security.freebsd.org/advisories/FreeBSD-SA-09:04.bind.asc" xml:lang="en">FreeBSD-SA-09:04</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.540362" xml:lang="en">SSA:2009-014-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-250846-1" xml:lang="en">250846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-045.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-045.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0009" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openbsd.org/errata44.html#008_bind" xml:lang="en">http://www.openbsd.org/errata44.html#008_bind</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500207/100/0/threaded" xml:lang="en">20090120 rPSA-2009-0009-1 bind bind-utils</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502322/100/0/threaded" xml:lang="en">20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33151" xml:lang="en">33151</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0004.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0004.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0043" xml:lang="en">ADV-2009-0043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0366" xml:lang="en">ADV-2009-0366</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0904" xml:lang="en">ADV-2009-0904</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2938" xml:lang="en">https://issues.rpath.com/browse/RPL-2938</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.isc.org/software/bind/advisories/cve-2009-0025" xml:lang="en">https://www.isc.org/software/bind/advisories/cve-2009-0025</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00393.html" xml:lang="en">FEDORA-2009-0350</vuln:reference>
    </vuln:references>
    <vuln:summary>BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0026">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:jackrabbit:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:jackrabbit:1.5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:jackrabbit:1.4</vuln:product>
      <vuln:product>cpe:/a:apache:jackrabbit:1.5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0026</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:56.557-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4942" xml:lang="en">4942</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt" xml:lang="en">http://www.apache.org/dist/jackrabbit/RELEASE-NOTES-1.5.2.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500196/100/0/threaded" xml:lang="en">20090120 [ANNOUNCE] Apache Jackrabbit 1.5.2 released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33360" xml:lang="en">33360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0177" xml:lang="en">ADV-2009-0177</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48110" xml:lang="en">jackrabbit-search-swr-xss(48110)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.apache.org/jira/browse/JCR-1925" xml:lang="en">https://issues.apache.org/jira/browse/JCR-1925</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Apache Jackrabbit before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the q parameter to (1) search.jsp or (2) swr.jsp.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0027">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp01"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp02"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp03"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp04"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp05"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp06"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp01"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp02"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp03"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp04"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp01</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp02</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp03</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp04</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp05</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0:cp06</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp01</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp02</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp03</vuln:product>
      <vuln:product>cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0:cp04</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0027</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:53:33.483-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0346.html" xml:lang="en">RHSA-2009:0346</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0347.html" xml:lang="en">RHSA-2009:0347</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0348.html" xml:lang="en">RHSA-2009:0348</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0349.html" xml:lang="en">RHSA-2009:0349</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34023" xml:lang="en">34023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021817" xml:lang="en">1021817</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479668" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479668</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://jira.jboss.org/jira/browse/JBPAPP-1548" xml:lang="en">https://jira.jboss.org/jira/browse/JBPAPP-1548</vuln:reference>
    </vuln:references>
    <vuln:summary>The request handler in JBossWS in JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP06 and 4.3 before 4.3.0.CP04 does not properly validate the resource path during a request for a WSDL file with a custom web-service endpoint, which allows remote attackers to read arbitrary XML files via a crafted request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0028">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0028</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:58:57.353-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11187" name="oval:org.mitre.oval:def:11187"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7947" name="oval:org.mitre.oval:def:7947"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0459.html" xml:lang="en">RHSA-2009:0459</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-002.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-002.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-signal-vulnerability.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0084" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1800" xml:lang="en">DSA-1800</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:118" xml:lang="en">MDVSA-2009:118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0451.html" xml:lang="en">RHSA-2009:0451</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503610/100/0/threaded" xml:lang="en">20090516 rPSA-2009-0084-1 kernel</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33906" xml:lang="en">33906</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479932" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479932</vuln:reference>
    </vuln:references>
    <vuln:summary>The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0029">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:debian:debian_linux:4.0</vuln:product>
      <vuln:product>cpe:/o:debian:debian_linux:5.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0029</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-08T15:19:43.207-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2018-11-07T09:33:16.970-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123155111608910&amp;w=2" xml:lang="en">[linux-kernel] 20090110 Re: [PATCH -v7][RFC]: mutex: implement adaptive spinning</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" xml:lang="en">MDVSA-2009:135</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33275" xml:lang="en">33275</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479969" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479969</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html" xml:lang="en">FEDORA-2009-0816</vuln:reference>
    </vuln:references>
    <vuln:summary>The ABI in the Linux kernel 2.6.28 and earlier on s390, powerpc, sparc64, and mips 64-bit platforms requires that a 32-bit argument in a 64-bit register was properly sign extended when sent from a user-mode application, but cannot verify this, which allows local users to cause a denial of service (crash) or possibly gain privileges via a crafted system call.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0030">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:squirrelmail:squirrelmail:1.4.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:squirrelmail:squirrelmail:1.4.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0030</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:35.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10366" name="oval:org.mitre.oval:def:10366"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" xml:lang="en">SUSE-SR:2009:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021611" xml:lang="en">1021611</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33354" xml:lang="en">33354</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=480224" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=480224</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=480488" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=480488</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48115" xml:lang="en">squirrelmail-sessionid-session-hijacking(48115)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-0057.html" xml:lang="en">RHSA-2009:0057</vuln:reference>
    </vuln:references>
    <vuln:summary>A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0031">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0031</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T21:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:35.357-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11386" name="oval:org.mitre.oval:def:11386"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git2.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d54ee1c7850a954026deec4cd4885f331da35cc" xml:lang="en">http://git2.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=0d54ee1c7850a954026deec4cd4885f331da35cc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0264.html" xml:lang="en">RHSA-2009:0264</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/19/4" xml:lang="en">[oss-security] 20090119 CVE-2009-0031 kernel: local denial of service in keyctl_join_session_keyring</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0331.html" xml:lang="en">RHSA-2009:0331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0360.html" xml:lang="en">RHSA-2009:0360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Memory leak in the keyctl_join_session_keyring function (security/keys/keyctl.c) in Linux kernel 2.6.29-rc2 and earlier allows local users to cause a denial of service (kernel memory consumption) via unknown vectors related to a "missing kfree."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0032">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:cups"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:mandriva:corporate_server:3.0"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:corporate_server:3.0::x86_64"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:corporate_server:4.0"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:corporate_server:4.0::x86_64"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:linux:2008.0"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:linux:2008.0::x86_64"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:linux:2008.1"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:linux:2008.1::x86_64"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:linux:2009.0"/>
          <cpe-lang:fact-ref name="cpe:/o:mandriva:multi_network_firewall:2.0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0032</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:46.250-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021637" xml:lang="en">1021637</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:027" xml:lang="en">MDVSA-2009:027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:028" xml:lang="en">MDVSA-2009:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:029" xml:lang="en">MDVSA-2009:029</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33418" xml:lang="en">33418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48210" xml:lang="en">cups-pdflog-symlink(48210)</vuln:reference>
    </vuln:references>
    <vuln:summary>CUPS on Mandriva Linux 2008.0, 2008.1, 2009.0, Corporate Server (CS) 3.0 and 4.0, and Multi Network Firewall (MNF) 2.0 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0033">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.30"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.31"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.32"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.33"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.34"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.35"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.37"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.38"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.39"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:tomcat:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.30</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.31</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.32</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.33</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.34</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.35</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.36</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.37</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.38</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.39</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.16</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0033</vuln:cve-id>
    <vuln:published-datetime>2009-06-05T12:00:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-25T07:30:34.427-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10231" name="oval:org.mitre.oval:def:10231"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19110" name="oval:org.mitre.oval:def:19110"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5739" name="oval:org.mitre.oval:def:5739"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN87272440/index.html" xml:lang="en">JVN#87272440</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127420533226623&amp;w=2" xml:lang="en">HPSBMA02535</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129070310906557&amp;w=2" xml:lang="en">HPSBUX02579</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=133469267822771&amp;w=2" xml:lang="en">HPSBOV02762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136485229118404&amp;w=2" xml:lang="en">HPSBUX02860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022331" xml:lang="en">1022331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1" xml:lang="en">263529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=742915&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=742915&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=781362&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=781362&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-4.html" xml:lang="en">http://tomcat.apache.org/security-4.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-5.html" xml:lang="en">http://tomcat.apache.org/security-5.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-6.html" xml:lang="en">http://tomcat.apache.org/security-6.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2207" xml:lang="en">DSA-2207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:136" xml:lang="en">MDVSA-2009:136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:138" xml:lang="en">MDVSA-2009:138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:176" xml:lang="en">MDVSA-2010:176</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504044/100/0/threaded" xml:lang="en">20090603 [SECURITY] CVE-2009-0033 Apache Tomcat DoS when using Java AJP connector</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35193" xml:lang="en">35193</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1496" xml:lang="en">ADV-2009-1496</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1856" xml:lang="en">ADV-2009-1856</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/3056" xml:lang="en">ADV-2010-3056</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50928" xml:lang="en">tomcat-ajp-dos(50928)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html" xml:lang="en">FEDORA-2009-11374</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html" xml:lang="en">FEDORA-2009-11352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html" xml:lang="en">FEDORA-2009-11356</vuln:reference>
    </vuln:references>
    <vuln:summary>Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0034">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p17"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p18"/>
        <cpe-lang:fact-ref name="cpe:/a:todd_miller:sudo:1.6.9_p19"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p17</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p18</vuln:product>
      <vuln:product>cpe:/a:todd_miller:sudo:1.6.9_p19</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0034</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:11.963-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10856" name="oval:org.mitre.oval:def:10856"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6462" name="oval:org.mitre.oval:def:6462"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000060.html" xml:lang="en">[Security-announce] 20090710 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0021" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0021</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327" xml:lang="en">http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:033" xml:lang="en">MDVSA-2009:033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0267.html" xml:lang="en">RHSA-2009:0267</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500546/100/0/threaded" xml:lang="en">20090129 rPSA-2009-0021-1 sudo</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504849/100/0/threaded" xml:lang="en">20090711 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33517" xml:lang="en">33517</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021688" xml:lang="en">1021688</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&amp;r2=1.160.2.22&amp;f=h" xml:lang="en">http://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&amp;r2=1.160.2.22&amp;f=h</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0009.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0009.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1865" xml:lang="en">ADV-2009-1865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.novell.com/show_bug.cgi?id=468923" xml:lang="en">https://bugzilla.novell.com/show_bug.cgi?id=468923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2954" xml:lang="en">https://issues.rpath.com/browse/RPL-2954</vuln:reference>
    </vuln:references>
    <vuln:summary>parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0036">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:libvirt:libvirt:0.5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:libvirt:libvirt:0.5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0036</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:35.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10127" name="oval:org.mitre.oval:def:10127"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28" xml:lang="en">http://git.et.redhat.com/?p=libvirt.git;a=commitdiff;h=2bb0657e28</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/02/10/8" xml:lang="en">[oss-security] 20090210 libvirt_proxy heads up</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0382.html" xml:lang="en">RHSA-2009:0382</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33724" xml:lang="en">33724</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=484947" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=484947</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/libvir-list/2009-January/msg00699.html" xml:lang="en">[libvir-list] 20090127 [libvirt] [PATCH] proxy: Fix use of uninitalized memory</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/libvir-list/2009-January/msg00726.html" xml:lang="en">[libvir-list] 20090128 Re: [libvirt] [PATCH] proxy: Fix use of uninitalized memory</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/libvir-list/2009-January/msg00728.html" xml:lang="en">[libvir-list] 20090128 Re: [libvirt] [PATCH] proxy: Fix use of uninitalized memory</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the proxyReadClientSocket function in proxy/libvirt_proxy.c in libvirt_proxy 0.5.1 might allow local users to gain privileges by sending a portion of the header of a virProxyPacket packet, and then sending the remainder of the packet with crafted values in the header, related to use of uninitialized memory in a validation check.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0037">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.1beta"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:6.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.8"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.5"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.6"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.7"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.10.8"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.12"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.13"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.14"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.15"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.17"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.18"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:curl:7.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.12"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.12.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.13"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.14"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.15"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:curl:libcurl:7.19.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:curl:curl:5.11</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.0</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.1beta</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.3.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.4</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.5</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.5.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:6.5.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.1.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.2.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.4</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.4.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.4.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.5</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.5.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.5.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.6</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.6.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.7</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.7.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.7.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.7.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.8</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.8.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.8.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.4</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.5</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.6</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.7</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.9.8</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.4</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.5</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.6</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.7</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.10.8</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.11.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.12</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.12.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.12.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.13</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.13.2</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.14</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.14.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.15</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.15.1</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.15.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.16.3</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.16.4</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.17</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.18</vuln:product>
      <vuln:product>cpe:/a:curl:curl:7.19.3</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:5.11</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.12</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.12.1</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.12.2</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.12.3</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.13</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.13.1</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.13.2</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.14</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.14.1</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.15</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.15.1</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.15.2</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.15.3</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.16.3</vuln:product>
      <vuln:product>cpe:/a:curl:libcurl:7.19.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0037</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:14.307-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054" name="oval:org.mitre.oval:def:11054"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074" name="oval:org.mitre.oval:def:6074"/>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://curl.haxx.se/docs/adv_20090303.html" xml:lang="en">http://curl.haxx.se/docs/adv_20090303.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://curl.haxx.se/lxr/source/CHANGES" xml:lang="en">http://curl.haxx.se/lxr/source/CHANGES</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" xml:lang="en">SUSE-SR:2009:006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000060.html" xml:lang="en">[Security-announce] 20090710 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-21.xml" xml:lang="en">GLSA-200903-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.476602" xml:lang="en">SSA:2009-069-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1738" xml:lang="en">DSA-1738</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0341.html" xml:lang="en">RHSA-2009:0341</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501757/100/0/threaded" xml:lang="en">20090312 rPSA-2009-0042-1 curl</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504849/100/0/threaded" xml:lang="en">20090711 VMSA-2009-0009 ESX Service Console updates for udev, sudo, and curl</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33962" xml:lang="en">33962</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021783" xml:lang="en">1021783</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-726-1" xml:lang="en">USN-726-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0009.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0009.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0581" xml:lang="en">ADV-2009-0581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1865" xml:lang="en">ADV-2009-1865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/" xml:lang="en">http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf" xml:lang="en">http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49030" xml:lang="en">curl-location-security-bypass(49030)</vuln:reference>
    </vuln:references>
    <vuln:summary>The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0038">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:geronimo:2.1</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0038</vuln:cve-id>
    <vuln:published-datetime>2009-04-17T10:30:00.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:19.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://dsecrg.com/pages/vul/show.php?id=119" xml:lang="en">http://dsecrg.com/pages/vul/show.php?id=119</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" xml:lang="en">http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://issues.apache.org/jira/browse/GERONIMO-4597" xml:lang="en">http://issues.apache.org/jira/browse/GERONIMO-4597</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502734/100/0/threaded" xml:lang="en">20090416 [DSECRG-09-019] Apache Geronimo - XSS vulnerabilities.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34562" xml:lang="en">34562</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1089" xml:lang="en">ADV-2009-1089</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) ip, (3) username, or (4) description parameter to console/portal/Server/Monitoring; or (5) the PATH_INFO to the default URI under console/portal/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0039">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:geronimo:2.1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:geronimo:2.1</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:geronimo:2.1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0039</vuln:cve-id>
    <vuln:published-datetime>2009-04-17T10:30:00.547-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:19.620-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://dsecrg.com/pages/vul/show.php?id=120" xml:lang="en">http://dsecrg.com/pages/vul/show.php?id=120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214" xml:lang="en">http://geronimo.apache.org/21x-security-report.html#2.1.xSecurityReport-214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://issues.apache.org/jira/browse/GERONIMO-4597" xml:lang="en">http://issues.apache.org/jira/browse/GERONIMO-4597</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502735/100/0/threaded" xml:lang="en">20090416 [DSECRG-09-020] Apache Geronimo - XSRF vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34562" xml:lang="en">34562</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1089" xml:lang="en">ADV-2009-1089</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site request forgery (CSRF) vulnerabilities in the web administration console in Apache Geronimo Application Server 2.1 through 2.1.3 allow remote attackers to hijack the authentication of administrators for requests that (1) change the web administration password, (2) upload applications, and perform unspecified other administrative actions, as demonstrated by (3) a Shutdown request to console/portal//Server/Shutdown.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0040">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:0.89c"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:0.95"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:a"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:d"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:e"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:f"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:g"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:h"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:i"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.6:j"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta13"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta14"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta15"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta16"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta17"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:beta18"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.7:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.11:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.11:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.11:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.12:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.12:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.15:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.15:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.15:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.23:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.24"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.25:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.25:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.29"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.29:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.29:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.29:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.29:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.30"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.31"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.32"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.33"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.34"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.35"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.37"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.38"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.39"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.40"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.41"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.0.42"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.3:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.4:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.4:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.4:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.6:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.7:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.7:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.8:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.10:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.11:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.13:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.13:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.13:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.14:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.14:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.14:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.15:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.16:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.16:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.17:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta12"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta13"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta14"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta15"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta16"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta17"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta18"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta19"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta20"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta21"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta22"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta23"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta24"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta25"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta26"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta27"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta28"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta29"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta30"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta31"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta32"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta33"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.19:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.21:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:beta03"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:beta04"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:beta05"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:beta06"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:rc01"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.25:rc02"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta01"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta02"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta03"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta04"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta05"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:beta06"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.26:rc01"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:libpng:libpng:1.2.34"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:libpng:libpng:0.89c</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:0.95</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.0</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:a</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:d</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:e</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:f</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:g</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:h</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:i</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.6:j</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta11</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta12</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta13</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta14</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta15</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta16</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta17</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:beta18</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.7:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.8:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta10</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta8</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:beta9</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.9:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.10</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.10:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.10:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.11</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.11:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.11:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.11:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.11:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.12</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.12:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.12:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.13</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.14</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.15</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.15:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.15:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.15:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.16</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.17</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.17:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.18</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.19</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.19:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.19:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.19:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.19:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.20</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.21</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.21:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.21:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.22</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.22:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.23:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.24</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.24:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.25</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.25:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.25:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.26</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.27:rc6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.28:rc6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.29</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.29:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.29:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.29:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.29:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.30</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.31</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.32</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.33</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.34</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.35</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.37</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.38</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.39</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.40</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.41</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.0.42</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.1:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.2:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.3:rc6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.4:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.4:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.4:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.4:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.5:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.6:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.7:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.7:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.8:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta10</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta8</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:beta9</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.9:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:beta7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.10:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.11:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.13</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.13:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.13:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.13:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.14</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.14:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.14:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.14:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.15:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.16</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.16:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.16:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.17:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.18</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta10</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta11</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta12</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta13</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta14</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta15</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta16</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta17</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta18</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta19</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta20</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta21</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta22</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta23</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta24</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta25</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta26</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta27</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta28</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta29</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta30</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta31</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta32</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta33</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta7</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta8</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:beta9</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.19:rc6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc5</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.20:rc6</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21:rc2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.21:rc3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22:beta1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22:beta2</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22:beta3</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22:beta4</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.23</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.24</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:beta03</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:beta04</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:beta05</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:beta06</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:rc01</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.25:rc02</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta01</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta02</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta03</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta04</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta05</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:beta06</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.26:rc01</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.27</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.28</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.29</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.30</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.31</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.32</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.33</vuln:product>
      <vuln:product>cpe:/a:libpng:libpng:1.2.34</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0040</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:20.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" name="oval:org.mitre.oval:def:10316"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" name="oval:org.mitre.oval:def:6458"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" xml:lang="en">ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" xml:lang="en">http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" xml:lang="en">APPLE-SA-2009-08-05-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" xml:lang="en">APPLE-SA-2009-06-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000062.html" xml:lang="en">[security-announce] 20090820 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-28.xml" xml:lang="en">GLSA-200903-28</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201209-25.xml" xml:lang="en">GLSA-201209-25</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" xml:lang="en">[png-mng-implement] 20090219 libpng-1.2.35 and libpng-1.0.43 fix security vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?group_id=1689&amp;release_id=662441" xml:lang="en">http://sourceforge.net/project/shownotes.php?group_id=1689&amp;release_id=662441</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" xml:lang="en">259989</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" xml:lang="en">1020521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3613" xml:lang="en">http://support.apple.com/kb/HT3613</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3757" xml:lang="en">http://support.apple.com/kb/HT3757</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0046" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0046</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1750" xml:lang="en">DSA-1750</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/649212" xml:lang="en">VU#649212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" xml:lang="en">MDVSA-2009:051</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0325.html" xml:lang="en">RHSA-2009:0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0333.html" xml:lang="en">RHSA-2009:0333</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0340.html" xml:lang="en">RHSA-2009:0340</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501767/100/0/threaded" xml:lang="en">20090312 rPSA-2009-0046-1 libpng</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503912/100/0/threaded" xml:lang="en">20090529 VMSA-2009-0007 VMware Hosted products and ESX and ESXi patches resolve security issues</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/505990/100/0/threaded" xml:lang="en">20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33827" xml:lang="en">33827</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-218A.html" xml:lang="en">TA09-218A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0007.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0007.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0469" xml:lang="en">ADV-2009-0469</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0473" xml:lang="en">ADV-2009-0473</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1451" xml:lang="en">ADV-2009-1451</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1462" xml:lang="en">ADV-2009-1462</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1522" xml:lang="en">ADV-2009-1522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1560" xml:lang="en">ADV-2009-1560</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2172" xml:lang="en">ADV-2009-2172</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" xml:lang="en">libpng-pointer-arrays-code-execution(48819)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" xml:lang="en">FEDORA-2009-2045</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" xml:lang="en">FEDORA-2009-1976</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:summary>The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0041">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:a"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:b.2.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.0beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.2:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.3:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.10:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.11:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.12:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.12.1:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.13:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.14:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.15:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.16:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.17:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.18:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.19:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.20:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.21:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.21.1:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.22:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.23:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.24:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.25:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26.1:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.26.2:netsec"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.30.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.30.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.2.30.4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.11"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.12"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.13"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.14"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.15"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.16"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.17"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.18"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.20"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.21"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.22"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.22:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.22:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.23"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4.23:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4_revision_95946"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.4beta"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:asterisk:open_source:1.6.0.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/h:asterisk:s800i_appliance:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:a</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.1.3.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.1.3.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.2.0</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.2.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.4</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.5</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.3.6</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.5.0</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.5.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.5.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:b.2.5.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta7</vuln:product>
      <vuln:product>cpe:/a:asterisk:asterisk_business_edition:c.1.0:beta8</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0beta1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.0beta2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.2:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.3:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.10</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.10:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.11</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.11:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.12</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.12:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.12.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.12.1:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.13</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.13:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.14</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.14:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.15</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.15:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.16</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.16:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.17</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.17:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.18</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.18:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.19</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.19:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.20</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.20:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.21</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.21:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.21.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.21.1:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.22</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.22:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.23</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.23:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.24</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.24:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.25</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.25:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26.1:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.26.2:netsec</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.27</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.28</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.29</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.30</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.30.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.30.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.2.30.4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.0</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.0:beta4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.5</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.6</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.7</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.7.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.8</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.9</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.10</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.10.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.11</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.12</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.12.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.13</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.14</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.15</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.16</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.16.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.16.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.17</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.18</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.18.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19:rc1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19:rc2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19:rc3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19:rc4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.19.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.20</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.20:rc1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.20:rc2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.20:rc3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.21</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.21:rc1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.21:rc2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.21.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.21.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.22</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.22:rc3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.22:rc4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.22.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.22.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.23</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.23:rc1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.23:rc2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4.23:rc3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4_revision_95946</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.4beta</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta5</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta7</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta7.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta8</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:beta9</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:rc4</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:rc5</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0:rc6</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0.1</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0.2</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0.3</vuln:product>
      <vuln:product>cpe:/a:asterisk:open_source:1.6.0.3:rc1</vuln:product>
      <vuln:product>cpe:/h:asterisk:s800i_appliance:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0041</vuln:cve-id>
    <vuln:published-datetime>2009-01-14T18:30:00.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:44.903-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.digium.com/pub/security/AST-2009-001.html" xml:lang="en">http://downloads.digium.com/pub/security/AST-2009-001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200905-01.xml" xml:lang="en">GLSA-200905-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4910" xml:lang="en">4910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1952" xml:lang="en">DSA-1952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499884/100/0/threaded" xml:lang="en">20090108 AST-2009-001: Information leak in IAX2 authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33174" xml:lang="en">33174</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021549" xml:lang="en">1021549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0063" xml:lang="en">ADV-2009-0063</vuln:reference>
    </vuln:references>
    <vuln:summary>IAX2 in Asterisk Open Source 1.2.x before 1.2.31, 1.4.x before 1.4.23-rc4, and 1.6.x before 1.6.0.3-rc2; Business Edition A.x.x, B.x.x before B.2.5.7, C.1.x.x before C.1.10.4, and C.2.x.x before C.2.1.2.1; and s800i 1.2.x before 1.3.0 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0042">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-spyware:2007"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-spyware:2008"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-spyware_for_the_enterprise:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-spyware_for_the_enterprise:r8"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus:2007:8"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus:2008"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus_for_the_enterprise:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus_for_the_enterprise:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus_for_the_enterprise:r8"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:anti-virus_sdk"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:antivirus_gateway:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_backup:r11.1:_nil_:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_backup:r11.1:_nil_:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_backup:r11.5_nil_:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_backup:r11.5_nil_:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_backup:r12.0_nil_:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:arcserve_client_agent:-::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:common_services:11"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:common_services:11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_ez_antivirus:r6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_ez_antivirus:r7"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_intrusion_detection:2.0:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_intrusion_detection:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_intrusion_detection:3.0:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:etrust_intrusion_detection:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite_2007:3"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite_2008"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite_plus_2008"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:network_and_systems_management:r3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:network_and_systems_management:r3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:network_and_systems_management:r11"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:network_and_systems_management:r11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:protection_suites:r2"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:protection_suites:r3"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:protection_suites:r3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:secure_content_manager:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:secure_content_manager:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:threat_manager_for_the_enterprise:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:threat_manager_for_the_enterprise:r8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ca:anti-spyware:2007</vuln:product>
      <vuln:product>cpe:/a:ca:anti-spyware:2008</vuln:product>
      <vuln:product>cpe:/a:ca:anti-spyware_for_the_enterprise:8.1</vuln:product>
      <vuln:product>cpe:/a:ca:anti-spyware_for_the_enterprise:r8</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus:2007:8</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus:2008</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus_for_the_enterprise:7.1</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus_for_the_enterprise:8.1</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus_for_the_enterprise:r8</vuln:product>
      <vuln:product>cpe:/a:ca:anti-virus_sdk</vuln:product>
      <vuln:product>cpe:/a:ca:antivirus_gateway:7.1</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_backup:r11.1:_nil_:linux</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_backup:r11.1:_nil_:windows</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_backup:r11.5_nil_:linux</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_backup:r11.5_nil_:windows</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_backup:r12.0_nil_:windows</vuln:product>
      <vuln:product>cpe:/a:ca:arcserve_client_agent:-::windows</vuln:product>
      <vuln:product>cpe:/a:ca:common_services:11</vuln:product>
      <vuln:product>cpe:/a:ca:common_services:11.1</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_ez_antivirus:r6.1</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_ez_antivirus:r7</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_intrusion_detection:2.0:sp1</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_intrusion_detection:3.0</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_intrusion_detection:3.0:sp1</vuln:product>
      <vuln:product>cpe:/a:ca:etrust_intrusion_detection:4.0</vuln:product>
      <vuln:product>cpe:/a:ca:internet_security_suite_2007:3</vuln:product>
      <vuln:product>cpe:/a:ca:internet_security_suite_2008</vuln:product>
      <vuln:product>cpe:/a:ca:internet_security_suite_plus_2008</vuln:product>
      <vuln:product>cpe:/a:ca:network_and_systems_management:r3.0</vuln:product>
      <vuln:product>cpe:/a:ca:network_and_systems_management:r3.1</vuln:product>
      <vuln:product>cpe:/a:ca:network_and_systems_management:r11</vuln:product>
      <vuln:product>cpe:/a:ca:network_and_systems_management:r11.1</vuln:product>
      <vuln:product>cpe:/a:ca:protection_suites:r2</vuln:product>
      <vuln:product>cpe:/a:ca:protection_suites:r3</vuln:product>
      <vuln:product>cpe:/a:ca:protection_suites:r3.1</vuln:product>
      <vuln:product>cpe:/a:ca:secure_content_manager:8.0</vuln:product>
      <vuln:product>cpe:/a:ca:secure_content_manager:8.1</vuln:product>
      <vuln:product>cpe:/a:ca:threat_manager_for_the_enterprise:8.1</vuln:product>
      <vuln:product>cpe:/a:ca:threat_manager_for_the_enterprise:r8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0042</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T20:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:42.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca-anti-virus-engine-detection-evasion-multiple-vulnerabilities.aspx" xml:lang="en">http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/26/ca20090126-01-ca-anti-virus-engine-detection-evasion-multiple-vulnerabilities.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197601" xml:lang="en">http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500417/100/0/threaded" xml:lang="en">20090127 CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33464" xml:lang="en">33464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021639" xml:lang="en">1021639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0270" xml:lang="en">ADV-2009-0270</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48261" xml:lang="en">ca-antivirus-engine-security-bypass(48261)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0043">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ca:service_level_management:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:service_metric_analysis:r11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:service_metric_analysis:r11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:service_metric_analysis:r11.1:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ca:service_level_management:3.5</vuln:product>
      <vuln:product>cpe:/a:ca:service_metric_analysis:r11.0</vuln:product>
      <vuln:product>cpe:/a:ca:service_metric_analysis:r11.1</vuln:product>
      <vuln:product>cpe:/a:ca:service_metric_analysis:r11.1:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0043</vuln:cve-id>
    <vuln:published-datetime>2009-01-08T14:30:11.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:46.967-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/07.aspx" xml:lang="en">http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/07.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4887" xml:lang="en">4887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499857/100/0/threaded" xml:lang="en">20090107 CA20090107-01: CA Service Metric Analysis and CA Service Level Management smmsnmpd Arbitrary Command Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33161" xml:lang="en">33161</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0053" xml:lang="en">ADV-2009-0053</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=196148" xml:lang="en">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=196148</vuln:reference>
    </vuln:references>
    <vuln:summary>The smmsnmpd service in CA Service Metric Analysis r11.0 through r11.1 SP1 and Service Level Management 3.5 does not properly restrict access, which allows remote attackers to execute arbitrary commands via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0046">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:grid_engine:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:grid_engine:5.3:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:grid_engine:5.3:beta2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:grid_engine:5.3</vuln:product>
      <vuln:product>cpe:/a:sun:grid_engine:5.3:beta1</vuln:product>
      <vuln:product>cpe:/a:sun:grid_engine:5.3:beta2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0046</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:01.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:47.437-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0045" xml:lang="en">ADV-2009-0045</vuln:reference>
    </vuln:references>
    <vuln:summary>Sun GridEngine 5.3 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0047">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.15b"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.15c"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.16a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.17a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.18b"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.18c"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.19a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.19b"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.20a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.90a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.90b"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.90c"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:gale:gale:0.99"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gale:gale:0.15</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.15b</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.15c</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.16</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.16a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.17</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.17a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.18</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.18b</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.18c</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.19</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.19a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.19b</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.20a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.21</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.90a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.90b</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.90c</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.91</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.91a</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.91b</vuln:product>
      <vuln:product>cpe:/a:gale:gale:0.99</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0047</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:13.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:47.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0046" xml:lang="en">ADV-2009-0046</vuln:reference>
    </vuln:references>
    <vuln:summary>Gale 0.99 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0048">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openevidence:openevidence:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:openevidence:openevidence:1.0.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openevidence:openevidence:1.0.5</vuln:product>
      <vuln:product>cpe:/a:openevidence:openevidence:1.0.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0048</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:15.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:47.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0047" xml:lang="en">ADV-2009-0047</vuln:reference>
    </vuln:references>
    <vuln:summary>OpenEvidence 1.0.6 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0049">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:eid:eidlib:2.6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:eid:eidlib:2.6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0049</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:15.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:48.310-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:summary>Belgian eID middleware (eidlib) 2.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0050">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:entrouvert:lasso:1.9.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:entrouvert:lasso:2.0.0-1"/>
        <cpe-lang:fact-ref name="cpe:/a:entrouvert:lasso:2.2.1-0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:entrouvert:lasso:1.9.9.0</vuln:product>
      <vuln:product>cpe:/a:entrouvert:lasso:2.0.0-1</vuln:product>
      <vuln:product>cpe:/a:entrouvert:lasso:2.2.1-0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0050</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:15.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:48.640-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47837" xml:lang="en">openssl-dsa-verify-security-bypass(47837)</vuln:reference>
    </vuln:references>
    <vuln:summary>Lasso 2.2.1 and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0051">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.26"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.27"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:zxid:zxid:0.29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zxid:zxid:0.1</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.2</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.3</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.4</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.5</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.6</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.7</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.8</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.9</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.10</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.11</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.12</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.13</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.14</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.15</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.16</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.17</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.18</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.19</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.20</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.21</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.22</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.25</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.26</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.27</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.28</vuln:product>
      <vuln:product>cpe:/a:zxid:zxid:0.29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0051</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T13:30:15.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:48.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-016.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499827/100/0/threaded" xml:lang="en">20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47837" xml:lang="en">openssl-dsa-verify-security-bypass(47837)</vuln:reference>
    </vuln:references>
    <vuln:summary>ZXID 0.29 and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0052">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:netgear:wndap330_firmware:2.1.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:atheros:ar9160-bc1a_chipset"/>
          <cpe-lang:fact-ref name="cpe:/h:netgear:wndap330"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:netgear:wndap330_firmware:2.1.11</vuln:product>
      <vuln:product>cpe:/h:atheros:ar9160-bc1a_chipset</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0052</vuln:cve-id>
    <vuln:published-datetime>2009-11-12T18:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:49.343-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.5</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507777/100/0/threaded" xml:lang="en">20091110 Atheros Driver Reserved Frame Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36991" xml:lang="en">36991</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3212" xml:lang="en">ADV-2009-3212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/54216" xml:lang="en">netgear-wndap330-frame-dos(54216)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Atheros wireless driver, as used in Netgear WNDAP330 Wi-Fi access point with firmware 2.1.11 and other versions before 3.0.3 on the Atheros AR9160-BC1A chipset, and other products, allows remote authenticated users to cause a denial of service (device reboot or hang) and possibly execute arbitrary code via a truncated reserved management frame.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0053">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0053</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:49.813-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021593" xml:lang="en">1021593</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml" xml:lang="en">20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33268" xml:lang="en">33268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0140" xml:lang="en">ADV-2009-0140</vuln:reference>
    </vuln:references>
    <vuln:summary>PXE Encryption in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to obtain the decryption key via unspecified vectors, related to a "logic error."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0054">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0054</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:49.923-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021593" xml:lang="en">1021593</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml" xml:lang="en">20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33268" xml:lang="en">33268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0140" xml:lang="en">ADV-2009-0140</vuln:reference>
    </vuln:references>
    <vuln:summary>PXE Encryption in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to capture credentials by tricking a user into reading a modified or crafted e-mail message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0055">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0055</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:50.017-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021594" xml:lang="en">1021594</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml" xml:lang="en">20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33268" xml:lang="en">33268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0140" xml:lang="en">ADV-2009-0140</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in the administration interface in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to modify appliance preferences as arbitrary users via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0056">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ironport_postx:6.2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.4</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.2.7.6</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.3.0.3</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_encryption_appliance:6.5.0.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.1</vuln:product>
      <vuln:product>cpe:/h:cisco:ironport_postx:6.2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0056</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:50.127-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021594" xml:lang="en">1021594</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a5c4f7.shtml" xml:lang="en">20090114 IronPort Encryption Appliance / PostX and PXE Encryption Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33268" xml:lang="en">33268</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0140" xml:lang="en">ADV-2009-0140</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in the administration interface in Cisco IronPort Encryption Appliance 6.2.4 before 6.2.4.1.1, 6.2.5, 6.2.6, 6.2.7 before 6.2.7.7, 6.3 before 6.3.0.4, and 6.5 before 6.5.0.2; and Cisco IronPort PostX 6.2.1 before 6.2.1.1 and 6.2.2 before 6.2.2.3; allows remote attackers to execute commands and modify appliance preferences as arbitrary users via a logout action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0057">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_3"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_3a"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_4"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_4a"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0_4a_su1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:%282a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:%282b%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:%283a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:5.1%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1:5.1_%282a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%283c%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_%282a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_2a"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_2b"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1_3a"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0:%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0:%281a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0_1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0_1a"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1:%281a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1_1a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_2</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_3</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_3a</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_4</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_4a</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0_4a_su1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:%282a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:%282b%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:%283a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:5.1%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1:5.1_%282a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%283c%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_%282a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_2</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_2a</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_2b</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1_3a</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0:%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0:%281a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0_1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0_1a</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1:%281a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1_1a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0057</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T13:30:03.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.063-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a61928.shtml" xml:lang="en">20090121 Cisco Unified Communications Manager CAPF Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33379" xml:lang="en">33379</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021620" xml:lang="en">1021620</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0213" xml:lang="en">ADV-2009-0213</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48139" xml:lang="en">cucm-capf-dos-var1(48139)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Certificate Authority Proxy Function (CAPF) service in Cisco Unified Communications Manager 5.x before 5.1(3e) and 6.x before 6.1(3) allows remote attackers to cause a denial of service (voice service outage) by sending malformed input over a TCP session in which the "client terminates prematurely."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0058">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.1</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0058</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:50.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.1</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml" xml:lang="en">20090204 Multiple Vulnerabilities in Cisco Wireless LAN Controllers</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33608" xml:lang="en">33608</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021679" xml:lang="en">1021679</vuln:reference>
    </vuln:references>
    <vuln:summary>The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0059">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.1</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0059</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:50.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml" xml:lang="en">20090204 Multiple Vulnerabilities in Cisco Wireless LAN Controllers</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33608" xml:lang="en">33608</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021679" xml:lang="en">1021679</vuln:reference>
    </vuln:references>
    <vuln:summary>The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0061">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:4400_wireless_lan_controller:5.0"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.0"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.0"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:4400_wireless_lan_controller:5.0</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:5.0</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_series_integrated_wireless_lan_controller:5.0</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.1</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_7600_series_wireless_lan_controller:5.0</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.1</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0061</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:58.780-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml" xml:lang="en">20090204 Multiple Vulnerabilities in Cisco Wireless LAN Controllers</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33608" xml:lang="en">33608</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021679" xml:lang="en">1021679</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0062">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2.173.0"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_wireless_services_modules:4.2"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500_wireless_services_modules:4.2.173.0"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:wireless_lan_controller_software:4.2.173.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2.173.0</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_wireless_services_modules:4.2</vuln:product>
      <vuln:product>cpe:/h:cisco:catalyst_6500_wireless_services_modules:4.2.173.0</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.2</vuln:product>
      <vuln:product>cpe:/o:cisco:wireless_lan_controller_software:4.2.173.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0062</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:59.187-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a6c1dd.shtml" xml:lang="en">20090204 Multiple Vulnerabilities in Cisco Wireless LAN Controllers</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33608" xml:lang="en">33608</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021678" xml:lang="en">1021678</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0063">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.7"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.5</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.6</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.7</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0063</vuln:cve-id>
    <vuln:published-datetime>2009-04-24T11:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022116" xml:lang="en">1022116</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34641" xml:lang="en">34641</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2009&amp;suid=20090423_01" xml:lang="en">http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2009&amp;suid=20090423_01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1155" xml:lang="en">ADV-2009-1155</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50074" xml:lang="en">brightmail-controlcenter-xss(50074)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0064">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.5"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.6"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:7.7"/>
        <cpe-lang:fact-ref name="cpe:/h:symantec:brightmail_gateway_appliance:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.5</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.6</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:7.7</vuln:product>
      <vuln:product>cpe:/h:symantec:brightmail_gateway_appliance:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0064</vuln:cve-id>
    <vuln:published-datetime>2009-04-24T11:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.187-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022117" xml:lang="en">1022117</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34639" xml:lang="en">34639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2009&amp;suid=20090423_01" xml:lang="en">http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&amp;pvid=security_advisory&amp;year=2009&amp;suid=20090423_01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1155" xml:lang="en">ADV-2009-1155</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50075" xml:lang="en">brightmail-consolescripts-priv-escalation(50075)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allow remote authenticated users to gain privileges, and possibly obtain sensitive information or hijack sessions of arbitrary users, via vectors involving (1) administrative scripts or (2) console functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0065">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0065</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T14:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:36.043-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10872" name="oval:org.mitre.oval:def:10872"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9fcb95a105758b81ef0131cd18e2db5149f13e95" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=9fcb95a105758b81ef0131cd18e2db5149f13e95</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01832118" xml:lang="en">HPSBNS02449</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://patchwork.ozlabs.org/patch/15024/" xml:lang="en">http://patchwork.ozlabs.org/patch/15024/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0264.html" xml:lang="en">RHSA-2009:0264</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/05/1" xml:lang="en">[oss-security] 20090105 CVE request: kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0053.html" xml:lang="en">RHSA-2009:0053</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0331.html" xml:lang="en">RHSA-2009:0331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1055.html" xml:lang="en">RHSA-2009:1055</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33113" xml:lang="en">33113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022698" xml:lang="en">1022698</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0029" xml:lang="en">ADV-2009-0029</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2193" xml:lang="en">ADV-2009-2193</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=478800" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=478800</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01045.html" xml:lang="en">FEDORA-2009-0816</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0066">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:intel:trusted_execution_technology:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:intel:trusted_execution_technology:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0066</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T14:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-08T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-08T08:52:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk" xml:lang="en">http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://invisiblethingslab.com/press/itl-press-2009-01.pdf" xml:lang="en">http://invisiblethingslab.com/press/itl-press-2009-01.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html" xml:lang="en">http://theinvisiblethings.blogspot.com/2009/01/attacking-intel-trusted-execution.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33119" xml:lang="en">33119</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in Intel system software for Trusted Execution Technology (TXT) allow attackers to bypass intended loader integrity protections, as demonstrated by exploitation of tboot.  NOTE: as of 20090107, the only disclosure is a vague pre-advisory with no actionable information. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0068">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:freedesktop:xdg-utils:1.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freedesktop:xdg-utils:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0068</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T14:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-10T01:59:42.920-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/06/1" xml:lang="en">[oss-security] 20090106 Fwd: Using xdg-open in /etc/mailcap causes hole in Firefox (Demonstration/Exploit included)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33137" xml:lang="en">33137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugs.freedesktop.org/show_bug.cgi?id=19377" xml:lang="en">https://bugs.freedesktop.org/show_bug.cgi?id=19377</vuln:reference>
    </vuln:references>
    <vuln:summary>Interaction error in xdg-open allows remote attackers to execute arbitrary code by sending a file with a dangerous MIME type but using a safe type that Firefox sends to xdg-open, which causes xdg-open to process the dangerous file type through automatic type detection, as demonstrated by overwriting the .desktop file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0069">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0069</vuln:cve-id>
    <vuln:published-datetime>2009-01-07T15:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.267-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mail.opensolaris.org/pipermail/onnv-notify/2008-October/015342.html" xml:lang="en">[onnv-notify] 20081021 6300710 recursive mutex_enter in nfs4rename_persistent_fh()</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-139466-02-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-139466-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-248566-1" xml:lang="en">248566</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33128" xml:lang="en">33128</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021519" xml:lang="en">1021519</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0030" xml:lang="en">ADV-2009-0030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47750" xml:lang="en">solaris-nfs4client-dos(47750)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the nfs4rename_persistent_fh function in the NFS 4 (aka NFSv4) client in the kernel in Sun Solaris 10 and OpenSolaris before snv_102 allows local users to cause a denial of service (recursive mutex_enter and panic) via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0070">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0070</vuln:cve-id>
    <vuln:published-datetime>2009-01-08T14:30:11.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:36.120-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48214" xml:lang="en">safari-array-memory-disclosure(48214)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7673" xml:lang="en">7673</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in Apple Safari allows remote attackers to read the contents of arbitrary memory locations, cause a denial of service (application crash), and probably have unspecified other impact via the array index of the arguments array in a JavaScript function, possibly a related issue to CVE-2008-2307.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0071">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0071</vuln:cve-id>
    <vuln:published-datetime>2009-01-08T14:30:11.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:36.183-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-01/0220.html" xml:lang="en">20090107 Firefox 3.0.5 remote vulnerability via queryCommandState</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-01/0223.html" xml:lang="en">20090107 Re: Firefox 3.0.5 remote vulnerability via queryCommandState</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-01/0224.html" xml:lang="en">20090107 Re: Firefox 3.0.5 remote vulnerability via queryCommandState</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33154" xml:lang="en">33154</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=448329" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=448329</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=456727" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=456727</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=472507" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=472507</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8091" xml:lang="en">8091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8219" xml:lang="en">8219</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox 3.0.5 and earlier 3.0.x versions, when designMode is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a certain (a) replaceChild or (b) removeChild call, followed by a (1) queryCommandValue, (2) queryCommandState, or (3) queryCommandIndeterm call.  NOTE: it was later reported that 3.0.6 and 3.0.7 are also affected.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0072">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:8:beta2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:8:beta1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:8:beta2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0072</vuln:cve-id>
    <vuln:published-datetime>2009-01-08T14:30:11.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://skypher.com/index.php/2009/01/07/msie-screen-null-ptr-dos-details/" xml:lang="en">http://skypher.com/index.php/2009/01/07/msie-screen-null-ptr-dos-details/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33149" xml:lang="en">33149</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47788" xml:lang="en">ie-javascript-screen-dos(47788)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 6.0 through 8.0 beta2 allows remote attackers to cause a denial of service (application crash) via an onload=screen[""] attribute value in a BODY element.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0073">
    <vuln:cve-id>CVE-2009-0073</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.027-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.027-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0074">
    <vuln:cve-id>CVE-2009-0074</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.043-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.043-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0075">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003:-:sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003:-:sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-::~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1:~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-::~professional~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:~professional~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0075</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-27T09:07:54.350-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2019-02-26T14:44:29.160-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6000" name="oval:org.mitre.oval:def:6000"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33627" xml:lang="en">33627</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0389" xml:lang="en">ADV-2009-0389</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-011/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-011/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002" xml:lang="en">MS09-002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8077" xml:lang="en">8077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8079" xml:lang="en">8079</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8080" xml:lang="en">8080</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8082" xml:lang="en">8082</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 7 does not properly handle errors during attempted access to deleted objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to CFunctionPointer and the appending of document objects, aka "Uninitialized Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0076">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::professional_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:professional_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0076</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6081" name="oval:org.mitre.oval:def:6081"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0389" xml:lang="en">ADV-2009-0389</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-012/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-012/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-002" xml:lang="en">MS09-002</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 7, when XHTML strict mode is used, allows remote attackers to execute arbitrary code via the zoom style directive in conjunction with unspecified other directives in a malformed Cascading Style Sheets (CSS) stylesheet in a crafted HTML document, aka "CSS Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0077">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:forefront_threat_management_gateway:-:-:medium_business"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:standard"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2006:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2006:supportability"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:forefront_threat_management_gateway:-:-:medium_business</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:enterprise</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:standard</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2006:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2006:supportability</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0077</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:23.657-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6068" name="oval:org.mitre.oval:def:6068"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022045" xml:lang="en">1022045</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1030" xml:lang="en">ADV-2009-1030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016" xml:lang="en">MS09-016</vuln:reference>
    </vuln:references>
    <vuln:summary>The firewall engine in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2004 SP3, 2006, 2006 Supportability Update, and 2006 SP1; does not properly manage the session state of web listeners, which allows remote attackers to cause a denial of service (many stale sessions) via crafted packets, aka "Web Proxy TCP State Limited Denial of Service Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0078">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::32_bit</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:pro_x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0078</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6193" name="oval:org.mitre.oval:def:6193"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022044" xml:lang="en">1022044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1026" xml:lang="en">ADV-2009-1026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" xml:lang="en">MS09-012</vuln:reference>
    </vuln:references>
    <vuln:summary>The Windows Management Instrumentation (WMI) provider in Microsoft Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows WMI Service Isolation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0079">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0079</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6147" name="oval:org.mitre.oval:def:6147"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022044" xml:lang="en">1022044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1026" xml:lang="en">ADV-2009-1026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" xml:lang="en">MS09-012</vuln:reference>
    </vuln:references>
    <vuln:summary>The RPCSS service in Microsoft Windows XP SP2 and SP3 and Server 2003 SP1 and SP2 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows RPCSS Service Isolation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0080">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008:-:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008:-:x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008:-:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_server:2008:-:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008:-:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008:-:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0080</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.407-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:25.987-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6177" name="oval:org.mitre.oval:def:6177"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022044" xml:lang="en">1022044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1026" xml:lang="en">ADV-2009-1026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-012" xml:lang="en">MS09-012</vuln:reference>
    </vuln:references>
    <vuln:summary>The ThreadPool class in Windows Vista Gold and SP1, and Server 2008, does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by leveraging incorrect thread ACLs to access the resources of one of the processes, aka "Windows Thread Pool ACL Weakness Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0081">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0081</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:00.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6202" name="oval:org.mitre.oval:def:6202"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=" xml:lang="en">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34012" xml:lang="en">34012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021826" xml:lang="en">1021826</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0659" xml:lang="en">ADV-2009-0659</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006" xml:lang="en">MS09-006</vuln:reference>
    </vuln:references>
    <vuln:summary>The graphics device interface (GDI) implementation in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate input received from user mode, which allows remote attackers to execute arbitrary code via a crafted (1) Windows Metafile (aka WMF) or (2) Enhanced Metafile (aka EMF) image file, aka "Windows Kernel Input Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0082">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0082</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:01.483-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6036" name="oval:org.mitre.oval:def:6036"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=" xml:lang="en">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34027" xml:lang="en">34027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021827" xml:lang="en">1021827</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0659" xml:lang="en">ADV-2009-0659</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006" xml:lang="en">MS09-006</vuln:reference>
    </vuln:references>
    <vuln:summary>The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate handles, which allows local users to gain privileges via a crafted application that triggers unspecified "actions," aka "Windows Kernel Handle Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0083">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0083</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5440" name="oval:org.mitre.oval:def:5440"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-079.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=" xml:lang="en">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;DocumentOID=842987&amp;poid=</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34025" xml:lang="en">34025</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021827" xml:lang="en">1021827</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0659" xml:lang="en">ADV-2009-0659</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-006" xml:lang="en">MS09-006</vuln:reference>
    </vuln:references>
    <vuln:summary>The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 does not properly handle invalid pointers, which allows local users to gain privileges via an application that triggers use of a crafted pointer, aka "Windows Kernel Invalid Pointer Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0084">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:directx:8.1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:directx:9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:directx:9.0a"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:directx:9.0b"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:directx:9.0c"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:directx:8.1</vuln:product>
      <vuln:product>cpe:/a:microsoft:directx:9.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:directx:9.0a</vuln:product>
      <vuln:product>cpe:/a:microsoft:directx:9.0b</vuln:product>
      <vuln:product>cpe:/a:microsoft:directx:9.0c</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0084</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5618" name="oval:org.mitre.oval:def:5618"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-132.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-132.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt" xml:lang="en">http://www.piotrbania.com/all/adv/ms-directx-mjpeg-adv.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34460" xml:lang="en">34460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022040" xml:lang="en">1022040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1025" xml:lang="en">ADV-2009-1025</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-011" xml:lang="en">MS09-011</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in DirectShow in Microsoft DirectX 8.1 and 9.0 allows remote attackers to execute arbitrary code via an MJPEG file or video stream with a malformed Huffman table, which triggers an exception that frees heap memory that is later accessed, aka "MJPEG Decompression Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0085">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0085</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6011" name="oval:org.mitre.oval:def:6011"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021828" xml:lang="en">1021828</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0660" xml:lang="en">ADV-2009-0660</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-007" xml:lang="en">MS09-007</vuln:reference>
    </vuln:references>
    <vuln:summary>The Secure Channel (aka SChannel) authentication component in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008, when certificate authentication is used, does not properly validate the client's key exchange data in Transport Layer Security (TLS) handshake messages, which allows remote attackers to spoof authentication by crafting a TLS packet based on knowledge of the certificate but not the private key, aka "SChannel Spoofing Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0086">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::32_bit</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0086</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.453-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6149" name="oval:org.mitre.oval:def:6149"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34435" xml:lang="en">34435</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022041" xml:lang="en">1022041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1027" xml:lang="en">ADV-2009-1027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013" xml:lang="en">MS09-013</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote HTTP servers to execute arbitrary code via crafted parameter values in a response, related to error handling, aka "Windows HTTP Services Integer Underflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0087">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2002:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000:-:sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp1:~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_word:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2002:sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000:-:sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp1:~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0087</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:57.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5799" name="oval:org.mitre.oval:def:5799"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022043" xml:lang="en">1022043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1024" xml:lang="en">ADV-2009-1024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010" xml:lang="en">MS09-010</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Word 6 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and the Word 6 text converter in Microsoft Office Word 2000 SP3 and 2002 SP3; allows remote attackers to execute arbitrary code via a crafted Word 6 file that contains malformed data, aka "WordPad and Office Text Converter Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0088">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:office_converter_pack:2003"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2000:sp3"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2002:sp3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_converter_pack:2003</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2002:sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0088</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.483-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5736" name="oval:org.mitre.oval:def:5736"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=782" xml:lang="en">20090414 Microsoft Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022043" xml:lang="en">1022043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1024" xml:lang="en">ADV-2009-1024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010" xml:lang="en">MS09-010</vuln:reference>
    </vuln:references>
    <vuln:summary>The WordPerfect 6.x Converter (WPFT632.CNV, 1998.1.27.0) in Microsoft Office Word 2000 SP3 and Microsoft Office Converter Pack does not properly validate the length of an unspecified string, which allows remote attackers to execute arbitrary code via a crafted WordPerfect 6.x file, related to an unspecified counter and control structures on the stack, aka "Word 2000 WordPerfect 6.x Converter Stack Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0089">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0089</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.517-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6027" name="oval:org.mitre.oval:def:6027"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34437" xml:lang="en">34437</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022041" xml:lang="en">1022041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1027" xml:lang="en">ADV-2009-1027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013" xml:lang="en">MS09-013</vuln:reference>
    </vuln:references>
    <vuln:summary>Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Vista Gold allows remote web servers to impersonate arbitrary https web sites by using DNS spoofing to "forward a connection" to a different https web site that has a valid certificate matching its own domain name, but not a certificate matching the domain name of the host requested by the user, aka "Windows HTTP Services Certificate Name Mismatch Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0090">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:x86"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.0:sp3"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:.net_framework:1.0:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:1.1:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:3.5</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:3.5:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:x86</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0090</vuln:cve-id>
    <vuln:published-datetime>2009-10-14T06:30:00.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5716" name="oval:org.mitre.oval:def:5716"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-286A.html" xml:lang="en">TA09-286A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061" xml:lang="en">MS09-061</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0091">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:x86"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_7:-"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::r2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.0:sp3"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:1.1:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:2.0:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:.net_framework:3.5:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:.net_framework:1.0:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:1.1:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:2.0:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:3.5</vuln:product>
      <vuln:product>cpe:/a:microsoft:.net_framework:3.5:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_7:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::r2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:x86</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0091</vuln:cve-id>
    <vuln:published-datetime>2009-10-14T06:30:00.483-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6451" name="oval:org.mitre.oval:def:6451"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-286A.html" xml:lang="en">TA09-286A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061" xml:lang="en">MS09-061</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0092">
    <vuln:cve-id>CVE-2009-0092</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.073-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.073-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0093">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0093</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6138" name="oval:org.mitre.oval:def:6138"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html" xml:lang="en">http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33989" xml:lang="en">33989</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021830" xml:lang="en">1021830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0661" xml:lang="en">ADV-2009-0661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008" xml:lang="en">MS09-008</vuln:reference>
    </vuln:references>
    <vuln:summary>Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not restrict registration of the "wpad" hostname, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) feature, and conduct man-in-the-middle attacks by spoofing a proxy server, via a Dynamic Update request for this hostname, aka "DNS Server Vulnerability in WPAD Registration Vulnerability," a related issue to CVE-2007-1692.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0094">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0094</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6117" name="oval:org.mitre.oval:def:6117"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34013" xml:lang="en">34013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021829" xml:lang="en">1021829</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0661" xml:lang="en">ADV-2009-0661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008" xml:lang="en">MS09-008</vuln:reference>
    </vuln:references>
    <vuln:summary>The WINS server in Microsoft Windows 2000 SP4 and Server 2003 SP1 and SP2 does not restrict registration of the (1) "wpad" and (2) "isatap" NetBIOS names, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) and Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) features, and conduct man-in-the-middle attacks by spoofing a proxy server or ISATAP route, by registering one of these names in the WINS database, aka "WPAD WINS Server Registration Vulnerability," a related issue to CVE-2007-1692.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0095">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2002:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:visio:2002:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0095</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:39.817-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6179" name="oval:org.mitre.oval:def:6179"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0391" xml:lang="en">ADV-2009-0391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005" xml:lang="en">MS09-005</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly validate object data in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0096">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2002:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:visio:2002:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0096</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:40.330-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6172" name="oval:org.mitre.oval:def:6172"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0391" xml:lang="en">ADV-2009-0391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005" xml:lang="en">MS09-005</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 does not properly perform memory copy operations for object data, which allows remote attackers to execute arbitrary code via a crafted Visio document, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0097">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2002:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:visio:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:visio:2002:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:visio:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0097</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:40.923-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6188" name="oval:org.mitre.oval:def:6188"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0391" xml:lang="en">ADV-2009-0391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-005" xml:lang="en">MS09-005</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Visio 2002 SP2 and 2003 SP3 does not properly validate memory allocation for Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0098">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2003:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:exchange_server:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:exchange_server:2003:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:exchange_server:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0098</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:41.410-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6114" name="oval:org.mitre.oval:def:6114"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003" xml:lang="en">MS09-003</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Exchange 2000 Server SP3, Exchange Server 2003 SP2, and Exchange Server 2007 SP1 do not properly interpret Transport Neutral Encapsulation (TNEF) properties, which allows remote attackers to execute arbitrary code via a crafted TNEF message, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0099">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2003:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:exchange_server:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:exchange_server:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:exchange_server:2003:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:exchange_server:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0099</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:42.017-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6159" name="oval:org.mitre.oval:def:6159"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-041A.html" xml:lang="en">TA09-041A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-003" xml:lang="en">MS09-003</vuln:reference>
    </vuln:references>
    <vuln:summary>The Electronic Messaging System Microsoft Data Base (EMSMDB32) provider in Microsoft Exchange 2000 Server SP3 and Exchange Server 2003 SP2, as used in Exchange System Attendant, allows remote attackers to cause a denial of service (application outage) via a malformed MAPI command, aka "Literal Processing Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0100">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0100</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:42.533-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6043" name="oval:org.mitre.oval:def:6043"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguardcenter.com/advisory/FGA-2009-16.html" xml:lang="en">http://www.fortiguardcenter.com/advisory/FGA-2009-16.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502696/100/0/threaded" xml:lang="en">20090415 Microsoft Office Excel Remote Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022039" xml:lang="en">1022039</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1023" xml:lang="en">ADV-2009-1023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009" xml:lang="en">MS09-009</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel in Microsoft Office 2004 and 2008 for Mac; Microsoft Office Excel Viewer and Excel Viewer 2003 SP3; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 do not properly parse the Excel spreadsheet file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet that contains a malformed object with "an offset and a two-byte value" that trigger a memory calculation error, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0101">
    <vuln:cve-id>CVE-2009-0101</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.090-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.090-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0102">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_project:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_project:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:project_portfolio_server:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:project_portfolio_server:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:project_server:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:project_server:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:project_server:2007:sp2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_project:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_project:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:project_portfolio_server:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:project_portfolio_server:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:project_server:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:project_server:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:project_server:2007:sp2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0102</vuln:cve-id>
    <vuln:published-datetime>2009-12-09T13:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:43.643-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6298" name="oval:org.mitre.oval:def:6298"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-342A.html" xml:lang="en">TA09-342A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-074" xml:lang="en">MS09-074</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Project 2000 SR1 and 2002 SP1, and Office Project 2003 SP3, does not properly handle memory allocation for Project files, which allows remote attackers to execute arbitrary code via a malformed file, aka "Project Memory Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0103">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:playsms:playsms:0.9.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:playsms:playsms:0.9.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0103</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4888" xml:lang="en">4888</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33138" xml:lang="en">33138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7687" xml:lang="en">7687</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in playSMS 0.9.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) apps_path[plug] parameter to plugin/gateway/gnokii/init.php, the (2) apps_path[themes] parameter to plugin/themes/default/init.php, and the (3) apps_path[libs] parameter to lib/function.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0104">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:se-ed:ezpack:4.2:beta2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:se-ed:ezpack:4.2:beta2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0104</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.063-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.120-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4890" xml:lang="en">4890</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33131" xml:lang="en">33131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7680" xml:lang="en">7680</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in EZpack 4.2b2 allows remote attackers to execute arbitrary SQL commands via the qType parameter in a webboard prog action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0105">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:se-ed:ezpack:4.2:beta2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:se-ed:ezpack:4.2:beta2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0105</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.077-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4890" xml:lang="en">4890</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33131" xml:lang="en">33131</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7680" xml:lang="en">7680</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.php in EZpack 4.2b2 allows remote attackers to inject arbitrary web script or HTML via the mdfd parameter in a prog action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0106">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpauctions:phpauctions:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpauctions:phpauctions:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0106</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:16.863-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33115" xml:lang="en">33115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/43264" xml:lang="en">phpauctions-profile-sql-injection(43264)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7672" xml:lang="en">7672</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in profile.php in PHPAuctions (aka PHPAuctionSystem) allows remote attackers to execute arbitrary SQL commands via the user_id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0107">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpauctions:phpauctions:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpauctions:phpauctions:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0107</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:16.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33115" xml:lang="en">33115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7672" xml:lang="en">7672</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in profile.php in PHPAuctions (aka PHPAuctionSystem) allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0108">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpauctions:phpauctions:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpauctions:phpauctions:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0108</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4891" xml:lang="en">4891</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33120" xml:lang="en">33120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7674" xml:lang="en">7674</vuln:reference>
    </vuln:references>
    <vuln:summary>PHPAuctions (aka PHPAuctionSystem) allows remote attackers to bypass authentication and gain administrative access via modified (1) PHPAUCTION_RM_ID, (2) PHPAUCTION_RM_NAME, (3) PHPAUCTION_RM_USERNAME, and (4) PHPAUCTION_RM_EMAIL cookies.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0109">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:.05"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.51:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.52"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.60"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.61"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:riotpix:riotpix:.05</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.5</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.51:beta</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.52</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.60</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.61</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0109</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.157-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.323-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4892" xml:lang="en">4892</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33132" xml:lang="en">33132</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7682" xml:lang="en">7682</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in RiotPix 0.61 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0110">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:.05"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.51:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.52"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.60"/>
        <cpe-lang:fact-ref name="cpe:/a:riotpix:riotpix:0.61"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:riotpix:riotpix:.05</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.5</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.51:beta</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.52</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.60</vuln:product>
      <vuln:product>cpe:/a:riotpix:riotpix:0.61</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0110</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4893" xml:lang="en">4893</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33129" xml:lang="en">33129</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7679" xml:lang="en">7679</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in read.php in RiotPix 0.61 and earlier allows remote attackers to execute arbitrary SQL commands via the forumid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0111">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:goople_cms:goople_cms:1.8.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:goople_cms:goople_cms:1.8.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0111</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.433-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4894" xml:lang="en">4894</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33135" xml:lang="en">33135</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7683" xml:lang="en">7683</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0112">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:expinion:poll_pro:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:expinion:poll_pro:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0112</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123117044713213&amp;w=2" xml:lang="en">20090103 PollPro 3.0 XSRF VuLn</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4895" xml:lang="en">4895</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47754" xml:lang="en">pollpro-unspecified-csrf(47754)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in admin/agent_edit.asp in PollPro 3.0 allows remote attackers to create or modify accounts as administrators via the username, password, and name parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0113">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:xstandard"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.03"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.0:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.0:rc1"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.1"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.2"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.3"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.4"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.5"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.6"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla:1.5.8"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:xstandard</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0113</vuln:cve-id>
    <vuln:published-datetime>2009-01-09T13:30:03.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4896" xml:lang="en">4896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33143" xml:lang="en">33143</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7691" xml:lang="en">7691</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in attachmentlibrary.php in the XStandard component for Joomla! 1.5.8 and earlier allows remote attackers to list arbitrary directories via a .. (dot dot) in the X_CMS_LIBRARY_PATH HTTP header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0114">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:adobe:air:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.25"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63::linux"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.69.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.70.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::basic"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.24.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.34.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.35.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.39.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.31.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.45.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.47.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.48.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.112.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.114.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.115.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.124.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.0.584"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.10"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.36"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs3::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs4::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.15.3"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flex:3.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:air:1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.25</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63::linux</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.69.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.70.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.2</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::basic</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.24.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.34.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.35.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.39.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.16</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.31.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.45.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.47.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.48.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.112.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.114.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.115.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.124.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.0.584</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.10</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.36</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs3::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs4::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.15.3</vuln:product>
      <vuln:product>cpe:/a:adobe:flex:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0114</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.573-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16419" name="oval:org.mitre.oval:def:16419"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6662" name="oval:org.mitre.oval:def:6662"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5929" xml:lang="en">http://isc.sans.org/diary.html?storyid=5929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-23.xml" xml:lang="en">GLSA-200903-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021751" xml:lang="en">1021751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1" xml:lang="en">254909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-01.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0513" xml:lang="en">ADV-2009-0513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0743" xml:lang="en">ADV-2009-0743</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48902" xml:lang="en">flash-settings-manager-click-hijacking(48902)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Settings Manager in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87, and possibly other versions, allows remote attackers to trick a user into visiting an arbitrary URL via unknown vectors, related to "a potential Clickjacking issue variant."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0115">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:christophe.varoqui:multipath-tools:0.4.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:christophe.varoqui:multipath-tools:0.4.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0115</vuln:cve-id>
    <vuln:published-datetime>2009-03-30T12:30:00.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9214" name="oval:org.mitre.oval:def:9214"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml" xml:lang="en">http://download.opensuse.org/update/10.3-test/repodata/patch-kpartx-6082.xml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10691" xml:lang="en">http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10691</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705" xml:lang="en">http://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/cve/2009-0115" xml:lang="en">http://launchpad.net/bugs/cve/2009-0115</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" xml:lang="en">SUSE-SR:2009:008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2010/000082.html" xml:lang="en">[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-128.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-128.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1767" xml:lang="en">DSA-1767</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0528" xml:lang="en">ADV-2010-0528</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00231.html" xml:lang="en">FEDORA-2009-3449</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00236.html" xml:lang="en">FEDORA-2009-3453</vuln:reference>
    </vuln:references>
    <vuln:summary>The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, SUSE Linux Enterprise Server (SLES), Fedora, and possibly other operating systems, uses world-writable permissions for the socket file (aka /var/run/multipathd.sock), which allows local users to send arbitrary commands to the multipath daemon.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0119">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0119</vuln:cve-id>
    <vuln:published-datetime>2009-01-14T18:30:04.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4912" xml:lang="en">4912</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33204" xml:lang="en">33204</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7720" xml:lang="en">7720</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Microsoft Windows XP SP3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .chm file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0120">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:ibm:websphere_datapower_xml_security_gateway_xs40:3.6.1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:ibm:websphere_datapower_xml_security_gateway_xs40:3.6.1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0120</vuln:cve-id>
    <vuln:published-datetime>2009-01-14T19:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:50.640-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4911" xml:lang="en">4911</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499870/100/0/threaded" xml:lang="en">20090108 [IBM Datapower XS40] Denial of Service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33169" xml:lang="en">33169</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021547" xml:lang="en">1021547</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0111" xml:lang="en">ADV-2009-0111</vuln:reference>
    </vuln:references>
    <vuln:summary>The IBM WebSphere DataPower XML Security Gateway XS40 with firmware 3.6.1.5 allows remote attackers to cause a denial of service (device reboot) by sending data over an established SSL connection, as demonstrated by the abc\r\n\r\n string data.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0121">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:goople_cms:goople_cms:1.8.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:goople_cms:goople_cms:1.8.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0121</vuln:cve-id>
    <vuln:published-datetime>2009-01-14T19:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-15T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-15T11:05:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:summary>SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 allows remote attackers to execute arbitrary SQL commands via the password parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0122">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:hplip:2.7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:hplip:2.8.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:hplip:2.7.7</vuln:product>
      <vuln:product>cpe:/a:hp:hplip:2.8.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0122</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-31T01:54:38.047-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33249" xml:lang="en">33249</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-708-1" xml:lang="en">USN-708-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://launchpad.net/bugs/191299" xml:lang="en">https://launchpad.net/bugs/191299</vuln:reference>
    </vuln:references>
    <vuln:summary>hplip.postinst in HP Linux Imaging and Printing (HPLIP) 2.7.7 and 2.8.2 on Ubuntu allows local users to change the ownership of arbitrary files via unspecified manipulations in advance of an HPLIP installation or upgrade by an administrator, related to the product's attempt to correct the ownership of its configuration files within home directories.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0123">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0123</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.640-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://brian.mastenbrook.net/display/27" xml:lang="en">http://brian.mastenbrook.net/display/27</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5689" xml:lang="en">http://isc.sans.org/diary.html?storyid=5689</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33234" xml:lang="en">33234</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021581" xml:lang="en">1021581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47917" xml:lang="en">safari-rss-feed-info-disclosure(47917)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Apple Safari on Mac OS X 10.5 and Windows allows remote attackers to read arbitrary files on a client machine via vectors related to the association of Safari with the (1) feed, (2) feeds, and (3) feedsearch URL types for RSS feeds.  NOTE: as of 20090114, the only disclosure is a vague pre-advisory. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0124">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:arrl:tqsllib:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:arrl:tqsllib:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0124</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-06T02:05:51.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479650" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479650</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00557.html" xml:lang="en">FEDORA-2009-0543</vuln:reference>
    </vuln:references>
    <vuln:summary>The tqsl_verifyDataBlock function in openssl_cert.cpp in American Radio Relay League (ARRL) tqsllib 2.0 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0125">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:finkproject:libnasl:2.2.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:finkproject:libnasl:2.2.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0125</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-10T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-16T10:42:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511517" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511517</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvs.fedoraproject.org/viewvc/rpms/libnasl/F-10/libnasl.spec?r1=1.16&amp;r2=1.17" xml:lang="en">http://cvs.fedoraproject.org/viewvc/rpms/libnasl/F-10/libnasl.spec?r1=1.16&amp;r2=1.17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" xml:lang="en">SUSE-SR:2009:003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VIM</vuln:source>
      <vuln:reference href="http://www.attrition.org/pipermail/vim/2009-January/002133.html" xml:lang="en">20090120 CVE-2009-0125 (fwd)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479655" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479655</vuln:reference>
    </vuln:references>
    <vuln:summary>** DISPUTED **  NOTE: this issue has been disputed by the upstream vendor. nasl/nasl_crypto2.c in the Nessus Attack Scripting Language library (aka libnasl) 2.2.11 does not properly check the return value from the OpenSSL DSA_do_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.  NOTE: the upstream vendor has disputed this issue, stating "while we do misuse this function (this is a bug), it has absolutely no security ramification."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0126">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:berkeley:boinc_client:6.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:berkeley:boinc_client:6.4.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:berkeley:boinc_client:6.2.14</vuln:product>
      <vuln:product>cpe:/a:berkeley:boinc_client:6.4.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0126</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-06T01:49:14.547-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://boinc.berkeley.edu/trac/changeset/16883" xml:lang="en">http://boinc.berkeley.edu/trac/changeset/16883</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://boinc.berkeley.edu/trac/ticket/823" xml:lang="en">http://boinc.berkeley.edu/trac/ticket/823</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" xml:lang="en">SUSE-SR:2009:003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479664" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479664</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00034.html" xml:lang="en">FEDORA-2009-0578</vuln:reference>
    </vuln:references>
    <vuln:summary>The decrypt_public function in lib/crypt.cpp in the client in Berkeley Open Infrastructure for Network Computing (BOINC) 6.2.14 and 6.4.5 does not check the return value from the OpenSSL RSA_public_decrypt function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0127">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:heikki_toivonen:m2crypto:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:heikki_toivonen:m2crypto:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0127</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2016-05-13T13:09:07.033-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2016-05-11T12:04:40.137-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511515" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511515</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479676" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479676</vuln:reference>
    </vuln:references>
    <vuln:summary>** DISPUTED ** M2Crypto does not properly check the return value from the OpenSSL EVP_VerifyFinal, DSA_verify, ECDSA_verify, DSA_do_verify, and ECDSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.  NOTE: a Linux vendor disputes the relevance of this report to the M2Crypto product because "these functions are not used anywhere in m2crypto."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0128">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:llnl:slurm:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:llnl:slurm:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0128</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-16T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-16T11:26:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511511" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511511</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:summary>plugins/crypto/openssl/crypto_openssl.c in Simple Linux Utility for Resource Management (aka SLURM or slurm-llnl) does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0129">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:perl-openssl:libcrypt-openssl-dsa-perl:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:perl-openssl:libcrypt-openssl-dsa-perl:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0129</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-16T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-16T11:33:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511519</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:summary>libcrypt-openssl-dsa-perl does not properly check the return value from the OpenSSL DSA_verify and DSA_do_verify functions, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0130">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:erlang:erlang:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:erlang:erlang:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0130</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-16T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-16T11:37:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511520" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511520</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/12/4" xml:lang="en">[oss-security] 20090112 CVE Request -- tsqllib, slurm-llnl, libnasl, libcrypt-openssl-dsa-perl, erlang, boinc-client, m2crypto</vuln:reference>
    </vuln:references>
    <vuln:summary>** DISPUTED ** lib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value from the OpenSSL DSA_do_verify function, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.  NOTE: a package maintainer disputes this issue, reporting that there is a proper check within the only code that uses the applicable part of crypto_drv.c, and thus "this report is invalid."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0131">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0131</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-05T01:53:13.453-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.opensolaris.org/view_bug.do?bug_id=6711995" xml:lang="en">http://bugs.opensolaris.org/view_bug.do?bug_id=6711995</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-239188-1" xml:lang="en">239188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33267" xml:lang="en">33267</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021600" xml:lang="en">1021600</vuln:reference>
    </vuln:references>
    <vuln:summary>The UFS implementation in the kernel in Sun OpenSolaris snv_29 through snv_90 allows local users to cause a denial of service (panic) via the single posix_fallocate test in the SUSv3 POSIX test suite, related to an F_ALLOCSP fcntl call.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0132">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0132</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:56.563-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-59-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-117350-59-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-247986-1" xml:lang="en">247986</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33188" xml:lang="en">33188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021553" xml:lang="en">1021553</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.trapkit.de/advisories/TKADV2009-001.txt" xml:lang="en">http://www.trapkit.de/advisories/TKADV2009-001.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0099" xml:lang="en">ADV-2009-0099</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the aio_suspend function in Sun Solaris 8 through 10 and OpenSolaris, when 32-bit mode is enabled, allows local users to cause a denial of service (panic) via a large integer value in the second argument (aka nent argument).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0133">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:html_help_workshop:4.74"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:html_help_workshop:4.74</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0133</vuln:cve-id>
    <vuln:published-datetime>2009-01-15T12:30:00.703-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4914" xml:lang="en">4914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7727" xml:lang="en">7727</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Microsoft HTML Help Workshop 4.74 and earlier allows context-dependent attackers to execute arbitrary code via a .hhp file with a long "Index file" field, possibly a related issue to CVE-2006-0564.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0134">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:share2:easy_grid_control:3.51"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:share2:easy_grid_control:3.51</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0134</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T13:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:38.840-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4913" xml:lang="en">4913</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33272" xml:lang="en">33272</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47946" xml:lang="en">easygrid-activex-dosavefile-file-overwrite(47946)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7779" xml:lang="en">7779</vuln:reference>
    </vuln:references>
    <vuln:summary>Insecure method vulnerability in the EasyGrid.SGCtrl.32 ActiveX control in EasyGrid.ocx 1.0.0.1 in AAA EasyGrid ActiveX 3.51 allows remote attackers to create and overwrite arbitrary files via the (1) DoSaveFile or (2) DoSaveHtmlFile method.  NOTE: vector 1 could be leveraged for code execution by creating executable files in Startup folders or by accessing files using hcp:// URLs.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0135">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:1.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:2.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:amarok:amarok:1.4.10</vuln:product>
      <vuln:product>cpe:/a:amarok:amarok:2.0</vuln:product>
      <vuln:product>cpe:/a:amarok:amarok:2.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0135</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T13:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:51.077-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://amarok.kde.org/en/releases/2.0.1.1" xml:lang="en">http://amarok.kde.org/en/releases/2.0.1.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=254896" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=254896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" xml:lang="en">SUSE-SR:2009:003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/14/2" xml:lang="en">[oss-security] 20090114 CVE Request -- amarok</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-34.xml" xml:lang="en">GLSA-200903-34</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4915" xml:lang="en">4915</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://trapkit.de/advisories/TKADV2009-002.txt" xml:lang="en">http://trapkit.de/advisories/TKADV2009-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908391" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908401" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908401</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908415" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908415</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1706" xml:lang="en">DSA-1706</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:030" xml:lang="en">MDVSA-2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499984/100/0/threaded" xml:lang="en">20090111 [TKADV2009-002] Amarok Integer Overflow and Unchecked Allocation Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33210" xml:lang="en">33210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021558" xml:lang="en">1021558</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-739-1" xml:lang="en">USN-739-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0100" xml:lang="en">ADV-2009-0100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479560" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479560</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479946" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479946</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00708.html" xml:lang="en">FEDORA-2009-0715</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0136">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:1.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:amarok:amarok:2.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:amarok:amarok:1.4.10</vuln:product>
      <vuln:product>cpe:/a:amarok:amarok:2.0</vuln:product>
      <vuln:product>cpe:/a:amarok:amarok:2.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0136</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T13:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T16:59:53.810-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://amarok.kde.org/en/releases/2.0.1.1" xml:lang="en">http://amarok.kde.org/en/releases/2.0.1.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=254896" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=254896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" xml:lang="en">SUSE-SR:2009:003</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/14/2" xml:lang="en">[oss-security] 20090114 CVE Request -- amarok</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-34.xml" xml:lang="en">GLSA-200903-34</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4915" xml:lang="en">4915</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://trapkit.de/advisories/TKADV2009-002.txt" xml:lang="en">http://trapkit.de/advisories/TKADV2009-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908391" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908401" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908401</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://websvn.kde.org/?view=rev&amp;revision=908415" xml:lang="en">http://websvn.kde.org/?view=rev&amp;revision=908415</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1706" xml:lang="en">DSA-1706</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:030" xml:lang="en">MDVSA-2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499984/100/0/threaded" xml:lang="en">20090111 [TKADV2009-002] Amarok Integer Overflow and Unchecked Allocation Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33210" xml:lang="en">33210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021558" xml:lang="en">1021558</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-739-1" xml:lang="en">USN-739-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0100" xml:lang="en">ADV-2009-0100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479560" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479560</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479946" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479946</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00708.html" xml:lang="en">FEDORA-2009-0715</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0137">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0137</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:05.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-08-19T01:25:07.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00001.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in Safari RSS in Apple Mac OS X 10.4.11 and 10.5.6, and Windows XP and Vista, allow remote attackers to execute arbitrary JavaScript in the local security zone via a crafted feed: URL, related to "input validation issues."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0138">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0138</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:05.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:57.157-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33813" xml:lang="en">33813</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>servermgrd (Server Manager) in Apple Mac OS X 10.5.6 does not properly validate authentication credentials, which allows remote attackers to modify the system configuration.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0139">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0139</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:05.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:57.237-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the SMB component in Apple Mac OS X 10.5.6 allows remote SMB servers to cause a denial of service (system shutdown) or execute arbitrary code via a crafted SMB file system that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0140">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0140</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:05.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:57.347-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the SMB component in Apple Mac OS X 10.4.11 and 10.5.6 allows remote SMB servers to cause a denial of service (memory exhaustion and system shutdown) via a crafted file system name.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0141">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0141</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T19:30:05.077-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.750-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/alerts/2009/Feb/1021729.html" xml:lang="en">1021729</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33798" xml:lang="en">33798</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48727" xml:lang="en">macosx-xterm-information-disclosure(48727)</vuln:reference>
    </vuln:references>
    <vuln:summary>XTerm in Apple Mac OS X 10.4.11 and 10.5.6, when used with luit, creates tty devices with insecure world-writable permissions, which allows local users to write to the Xterm of another user.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0142">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0142</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T18:30:01.110-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:17:57.547-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>1.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-362"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" xml:lang="en">APPLE-SA-2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3438" xml:lang="en">http://support.apple.com/kb/HT3438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33759" xml:lang="en">33759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33812" xml:lang="en">33812</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0422" xml:lang="en">ADV-2009-0422</vuln:reference>
    </vuln:references>
    <vuln:summary>Race condition in AFP Server in Apple Mac OS X 10.5.6 allows local users to cause a denial of service (infinite loop) via unspecified vectors related to "file enumeration logic."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0143">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:-"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.6.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.8.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:4.9.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:5.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.3:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.4:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:6.0.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.1.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.3.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.4.3::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.6.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:7.7.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:itunes:8.0.1:-:windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:itunes:-</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.7.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.8.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:4.9.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:5.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:6.0.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.3.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.4.3::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.6.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:7.7.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:itunes:8.0.1:-:windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0143</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.437-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-08T15:21:13.067-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2018-11-07T09:39:39.437-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5336" name="oval:org.mitre.oval:def:5336"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce//2009/Mar/msg00001.html" xml:lang="en">APPLE-SA-2009-03-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021843" xml:lang="en">1021843</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3487" xml:lang="en">http://support.apple.com/kb/HT3487</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34094" xml:lang="en">34094</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0702" xml:lang="en">ADV-2009-0702</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49201" xml:lang="en">itunes-podcast-information-disclosure(49201)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple iTunes before 8.1 does not properly inform the user about the origin of an authentication request, which makes it easier for remote podcast servers to trick a user into providing a username and password when subscribing to a crafted podcast.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0144">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0144</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022214" xml:lang="en">1022214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50479" xml:lang="en">macos-cfnetwork-info-disclosure(50479)</vuln:reference>
    </vuln:references>
    <vuln:summary>CFNetwork in Apple Mac OS X 10.5 before 10.5.7 does not properly parse noncompliant Set-Cookie headers, which allows remote attackers to obtain sensitive information by sniffing the network for "secure cookies" that are sent over unencrypted HTTP connections.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0145">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0145</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:47.937-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" xml:lang="en">APPLE-SA-2009-06-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3613" xml:lang="en">http://support.apple.com/kb/HT3613</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022209" xml:lang="en">1022209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1522" xml:lang="en">ADV-2009-1522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50481" xml:lang="en">macos-coregraphics-pdf-code-execution(50481)</vuln:reference>
    </vuln:references>
    <vuln:summary>CoreGraphics in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0146">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.11</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0146</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.547-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9632" name="oval:org.mitre.oval:def:9632"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=263028" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=263028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-20.xml" xml:lang="en">GLSA-200904-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0059" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0061" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0430.html" xml:lang="en">RHSA-2009:0430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0431.html" xml:lang="en">RHSA-2009:0431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502750/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0061-1 cups</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502761/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0059-1 poppler</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022073" xml:lang="en">1022073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1065" xml:lang="en">ADV-2009-1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1066" xml:lang="en">ADV-2009-1066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1077" xml:lang="en">ADV-2009-1077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490612" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490612</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html" xml:lang="en">FEDORA-2009-6972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html" xml:lang="en">FEDORA-2009-6973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html" xml:lang="en">FEDORA-2009-6982</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0147">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.11</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0147</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.563-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941" name="oval:org.mitre.oval:def:9941"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=263028" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=263028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-20.xml" xml:lang="en">GLSA-200904-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0059" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0061" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0430.html" xml:lang="en">RHSA-2009:0430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0431.html" xml:lang="en">RHSA-2009:0431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502750/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0061-1 cups</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502761/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0059-1 poppler</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022073" xml:lang="en">1022073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1065" xml:lang="en">ADV-2009-1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1066" xml:lang="en">ADV-2009-1066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1077" xml:lang="en">ADV-2009-1077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490614" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490614</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html" xml:lang="en">FEDORA-2009-6972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html" xml:lang="en">FEDORA-2009-6973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html" xml:lang="en">FEDORA-2009-6982</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0148">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:13.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.0bl2"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.6"/>
        <cpe-lang:fact-ref name="cpe:/a:cscope:cscope:15.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cscope:cscope:13.0</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.0bl2</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.1</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.3</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.4</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.5</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.6</vuln:product>
      <vuln:product>cpe:/a:cscope:cscope:15.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0148</vuln:cve-id>
    <vuln:published-datetime>2009-05-05T13:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9633" name="oval:org.mitre.oval:def:9633"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200905-02.xml" xml:lang="en">GLSA-200905-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=947983" xml:lang="en">http://sourceforge.net/forum/forum.php?forum_id=947983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://sourceforge.net/mailarchive/forum.php?thread_name=E1LsGx3-00015K-TN%40ddv4jf1.ch3.sourceforge.com&amp;forum_name=cscope-cvs" xml:lang="en">[cscope-cvs] 20090410 CVS: cscope/src snprintf.c, NONE, 1.1 build.c, 1.14, 1.15 command.c, 1.32, 1.33 dir.c, 1.30, 1.31 display.c, 1.29, 1.30 edit.c, 1.6, 1.7 exec.c, 1.11, 1.12 find.c, 1.20, 1.21 global.h, 1.36, 1.37 main.c, 1.45, 1.46 Makefile.am, 1.12, 1.13 Makefile.in, 1.15, 1.16 vpaccess.c, 1.2, 1.3 vpfopen.c, 1.3, 1.4 vpopen.c, 1.4, 1.5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?group_id=4664&amp;release_id=679527" xml:lang="en">http://sourceforge.net/project/shownotes.php?group_id=4664&amp;release_id=679527</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1806" xml:lang="en">DSA-1806</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/05/06/9" xml:lang="en">[oss-security] 20090506 Re: Old cscope buffer overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1101.html" xml:lang="en">RHSA-2009:1101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1102.html" xml:lang="en">RHSA-2009:1102</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34805" xml:lang="en">34805</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022218" xml:lang="en">1022218</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1238" xml:lang="en">ADV-2009-1238</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490667" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490667</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Cscope before 15.7a allow remote attackers to execute arbitrary code via long strings in input such as (1) source-code tokens and (2) pathnames, related to integer overflows in some cases. NOTE: this issue exists because of an incomplete fix for CVE-2004-2541.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0149">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0149</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34942" xml:lang="en">34942</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022217" xml:lang="en">1022217</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50484" xml:lang="en">macos-diskimages-code-execution-var1(50484)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (application crash) by attempting to mount a crafted sparse disk image that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0150">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0150</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.063-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022217" xml:lang="en">1022217</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50483" xml:lang="en">macos-diskimages-bo(50483)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Apple Mac OS X 10.5 before 10.5.7 allows local users to gain privileges or cause a denial of service (application crash) by attempting to mount a crafted sparse disk image.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0151">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2:2008-002"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2:2008-002</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.7</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0151</vuln:cve-id>
    <vuln:published-datetime>2009-08-06T11:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" xml:lang="en">APPLE-SA-2009-08-05-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3757" xml:lang="en">http://support.apple.com/kb/HT3757</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35954" xml:lang="en">35954</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-218A.html" xml:lang="en">TA09-218A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2172" xml:lang="en">ADV-2009-2172</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/52421" xml:lang="en">macosx-dock-security-bypass(52421)</vuln:reference>
    </vuln:references>
    <vuln:summary>The screen saver in Dock in Apple Mac OS X 10.5 before 10.5.8 does not prevent four-finger Multi-Touch gestures, which allows physically proximate attackers to bypass locking and "manage applications or use Expose" via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0152">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0152</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.187-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022212" xml:lang="en">1022212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50487" xml:lang="en">macos-ichat-ssl-weak-security(50487)</vuln:reference>
    </vuln:references>
    <vuln:summary>iChat in Apple Mac OS X 10.5 before 10.5.7 disables SSL for AOL Instant Messenger (AIM) communication in certain circumstances that are inconsistent with the Require SSL setting, which allows remote attackers to obtain sensitive information by sniffing the network.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0153">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0153</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.340-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366" name="oval:org.mitre.oval:def:11366"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.icu-project.org/trac/ticket/5691" xml:lang="en">http://bugs.icu-project.org/trac/ticket/5691</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" xml:lang="en">APPLE-SA-2009-06-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3613" xml:lang="en">http://support.apple.com/kb/HT3613</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1122.html" xml:lang="en">RHSA-2009:1122</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34974" xml:lang="en">34974</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1522" xml:lang="en">ADV-2009-1522</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=503071" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=503071</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50488" xml:lang="en">macos-icu-security-bypass(50488)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html" xml:lang="en">FEDORA-2009-6121</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html" xml:lang="en">FEDORA-2009-6273</vuln:reference>
    </vuln:references>
    <vuln:summary>International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0154">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0154</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:14.970-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503597/100/0/threaded" xml:lang="en">20090519 ZDI-09-023: Apple OS X ATSServer Compact Font Format Parsing Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022218" xml:lang="en">1022218</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-023" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50478" xml:lang="en">macos-ats-cff-bo(50478)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple Type Services (ATS) in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to execute arbitrary code via a crafted Compact Font Format (CFF) font.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0155">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0155</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.390-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022209" xml:lang="en">1022209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50482" xml:lang="en">macos-coregraphics-pdf-bo(50482)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in CoreGraphics in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF file that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0156">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0156</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.437-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34932" xml:lang="en">34932</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022215" xml:lang="en">1022215</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50490" xml:lang="en">macos-launchservices-dos(50490)</vuln:reference>
    </vuln:references>
    <vuln:summary>Launch Services in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to cause a denial of service (persistent Finder crash) via a crafted Mach-O executable that triggers an out-of-bounds memory read.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0157">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0157</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.437-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022211" xml:lang="en">1022211</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50480" xml:lang="en">macos-cfnetwork-bo(50480)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in CFNetwork in Apple Mac OS X 10.5 before 10.5.7 allows remote web servers to execute arbitrary code or cause a denial of service (application crash) via long HTTP headers.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0158">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0158</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.453-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2016-08-22T21:59:32.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136482797910018&amp;w=2" xml:lang="en">SSRT101144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in telnet in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long hostname for a telnet server.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0159">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.72"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.73"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.94"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.95"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.96"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.97"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.98"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.0.99"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2p1"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2p2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2p3"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.2p4"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p0"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p1"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p2"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p3"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p4"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p5"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p6"/>
        <cpe-lang:fact-ref name="cpe:/a:ntp:ntp:4.2.4p7:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ntp:ntp:4.0.72</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.73</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.90</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.91</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.92</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.93</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.94</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.95</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.96</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.97</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.98</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.0.99</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.1.0</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.1.2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.0</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2p1</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2p2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2p3</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.2p4</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p0</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p1</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p2</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p3</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p4</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p5</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p6</vuln:product>
      <vuln:product>cpe:/a:ntp:ntp:4.2.4p7:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0159</vuln:cve-id>
    <vuln:published-datetime>2009-04-14T11:30:00.517-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:15.907-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19392" name="oval:org.mitre.oval:def:19392"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5411" name="oval:org.mitre.oval:def:5411"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8386" name="oval:org.mitre.oval:def:8386"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8665" name="oval:org.mitre.oval:def:8665"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9634" name="oval:org.mitre.oval:def:9634"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-006.txt.asc" xml:lang="en">NetBSD-SA2009-006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.pardus.org.tr/show_bug.cgi?id=9532" xml:lang="en">http://bugs.pardus.org.tr/show_bug.cgi?id=9532</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" xml:lang="en">SUSE-SR:2009:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136482797910018&amp;w=2" xml:lang="en">SSRT101144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&amp;REV=1.1565" xml:lang="en">http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&amp;REV=1.1565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1039.html" xml:lang="en">RHSA-2009:1039</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1040.html" xml:lang="en">RHSA-2009:1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.566238" xml:lang="en">SSA:2009-154-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1801" xml:lang="en">DSA-1801</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200905-08.xml" xml:lang="en">GLSA-200905-08</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:092" xml:lang="en">MDVSA-2009:092</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34481" xml:lang="en">34481</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022033" xml:lang="en">1022033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0999" xml:lang="en">ADV-2009-0999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490617" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490617</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49838" xml:lang="en">ntp-cookedprint-bo(49838)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1651.html" xml:lang="en">RHSA-2009:1651</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://support.ntp.org/bugs/show_bug.cgi?id=1144" xml:lang="en">https://support.ntp.org/bugs/show_bug.cgi?id=1144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/777-1/" xml:lang="en">USN-777-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01414.html" xml:lang="en">FEDORA-2009-5273</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01449.html" xml:lang="en">FEDORA-2009-5275</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0160">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0160</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-05-16T01:29:00.563-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34937" xml:lang="en">34937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022209" xml:lang="en">1022209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:summary>QuickDraw Manager in Apple Mac OS X 10.4.11 and 10.5 before 10.5.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PICT image that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0161">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.5</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x:10.5.6</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.4.11</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.0</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.1</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.2</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.3</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.4</vuln:product>
      <vuln:product>cpe:/o:apple:mac_os_x_server:10.5.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0161</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.640-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34926" xml:lang="en">34926</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50592" xml:lang="en">macos-opensslocsp-weak-security(50592)</vuln:reference>
    </vuln:references>
    <vuln:summary>The OpenSSL::OCSP module for Ruby in Apple Mac OS X 10.5 before 10.5.7 misinterprets an unspecified invalid response as a successful OCSP certificate validation, which might allow remote attackers to spoof certificate authentication via a revoked certificate.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0162">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.5"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x:10.5.6"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.0"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.1"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.2"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.3"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.4"/>
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x_server:10.5.6"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0:beta2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.0b2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.0.3:85.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.5"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:1.3.2:312.6"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.8"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.3:417.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:2.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.2"/>
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.0:beta"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:0.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:0.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.0b2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.0.3:85.8.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.5</vuln:product>
      <vuln:product>cpe:/a:apple:safari:1.3.2:312.6</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.8</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.3:417.9.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:2.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:safari:3.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:safari:4.0:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0162</vuln:cve-id>
    <vuln:published-datetime>2009-05-13T11:30:00.517-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.720-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00000.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00001.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3550" xml:lang="en">http://support.apple.com/kb/HT3550</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34925" xml:lang="en">34925</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022206" xml:lang="en">1022206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1298" xml:lang="en">ADV-2009-1298</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50476" xml:lang="en">safari-feedurl-code-execution(50476)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Safari before 3.2.3, and 4 Public Beta, on Apple Mac OS X 10.5 before 10.5.7 and Windows allows remote attackers to inject arbitrary web script or HTML via a crafted feed: URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0163">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:b1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:b2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:b1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0163</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:23.407-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11546" name="oval:org.mitre.oval:def:11546"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-20.xml" xml:lang="en">GLSA-200904-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0061" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cups.org/articles.php?L582" xml:lang="en">http://www.cups.org/articles.php?L582</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cups.org/str.php?L3031" xml:lang="en">http://www.cups.org/str.php?L3031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1773" xml:lang="en">DSA-1773</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0428.html" xml:lang="en">RHSA-2009:0428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502750/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0061-1 cups</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34571" xml:lang="en">34571</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022070" xml:lang="en">1022070</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-760-1" xml:lang="en">USN-760-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490596" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490596</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0164">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:b1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:b2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:b1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0164</vuln:cve-id>
    <vuln:published-datetime>2009-04-24T11:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:25.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=263070" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=263070</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-20.xml" xml:lang="en">GLSA-200904-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0061" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cups.org/articles.php?L582" xml:lang="en">http://www.cups.org/articles.php?L582</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cups.org/str.php?L3118" xml:lang="en">http://www.cups.org/str.php?L3118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502750/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0061-1 cups</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34665" xml:lang="en">34665</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490597" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490597</vuln:reference>
    </vuln:references>
    <vuln:summary>The web interface for CUPS before 1.3.10 does not validate the HTTP Host header in a client request, which makes it easier for remote attackers to conduct DNS rebinding attacks.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0165">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
          <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:3.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
          <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:poppler:poppler"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:3.0.1</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0165</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T15:30:00.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=263028" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=263028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" xml:lang="en">APPLE-SA-2009-06-17-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3639" xml:lang="en">http://support.apple.com/kb/HT3639</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1621" xml:lang="en">ADV-2009-1621</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50377" xml:lang="en">multiple-jbig2-unspecified(50377)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0166">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.90"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.91"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.11</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.2.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.9</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.90</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.91</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.5</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.6</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.7</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0166</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.610-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778" name="oval:org.mitre.oval:def:9778"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-20.xml" xml:lang="en">GLSA-200904-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0061" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0430.html" xml:lang="en">RHSA-2009:0430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0431.html" xml:lang="en">RHSA-2009:0431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502750/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0061-1 cups</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022073" xml:lang="en">1022073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1065" xml:lang="en">ADV-2009-1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1066" xml:lang="en">ADV-2009-1066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1077" xml:lang="en">ADV-2009-1077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=490625" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=490625</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html" xml:lang="en">FEDORA-2009-6972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html" xml:lang="en">FEDORA-2009-6973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html" xml:lang="en">FEDORA-2009-6982</vuln:reference>
    </vuln:references>
    <vuln:summary>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0167">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10.0::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10.0::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10.0::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10.0::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0167</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6175" name="oval:org.mitre.oval:def:6175"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://opensolaris.org/os/bug_reports/request_sponsor/" xml:lang="en">http://opensolaris.org/os/bug_reports/request_sponsor/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-139390-01-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-139390-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249306-1" xml:lang="en">249306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-026.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-026.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33269" xml:lang="en">33269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021601" xml:lang="en">1021601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0155" xml:lang="en">ADV-2009-0155</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in lpadmin in Sun Solaris 10 and OpenSolaris snv_61 through snv_106 allows local users to cause a denial of service via unspecified vectors, related to enumeration of "wrong printers," aka a "Temporary file vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0168">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0168</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.840-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5503" name="oval:org.mitre.oval:def:5503"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://opensolaris.org/os/bug_reports/request_sponsor/" xml:lang="en">http://opensolaris.org/os/bug_reports/request_sponsor/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-139390-01-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-139390-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249306-1" xml:lang="en">249306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-026.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-026.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33269" xml:lang="en">33269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021601" xml:lang="en">1021601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0155" xml:lang="en">ADV-2009-0155</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48143" xml:lang="en">solaris-ppdmgr-dos(48143)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in ppdmgr in Sun Solaris 10 and OpenSolaris snv_61 through snv_106 allows local users to cause a denial of service via unspecified vectors, related to a failure to "include all cache files," and improper handling of temporary files.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0169">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0169</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:48.923-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249106-1" xml:lang="en">249106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33266" xml:lang="en">33266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021604" xml:lang="en">1021604</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0157" xml:lang="en">ADV-2009-0157</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47944" xml:lang="en">sun-jsam-subrealm-privilege-escalation(47944)</vuln:reference>
    </vuln:references>
    <vuln:summary>Sun Java System Access Manager 7.1 allows remote authenticated sub-realm administrators to gain privileges, as demonstrated by creating the amadmin account in the sub-realm, and then logging in as amadmin in the root realm.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0170">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.0_2005q4"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.0_2005q4</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0170</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:26:33.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-242166-1" xml:lang="en">242166</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33265" xml:lang="en">33265</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021605" xml:lang="en">1021605</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0156" xml:lang="en">ADV-2009-0156</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47942" xml:lang="en">sun-jsam-password-info-disclosure(47942)</vuln:reference>
    </vuln:references>
    <vuln:summary>Sun Java System Access Manager 6.3 2005Q1, 7 2005Q4, and 7.1 allows remote authenticated users with console privileges to discover passwords, and obtain unspecified other "access to resources," by visiting the Configuration Items component in the console.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0171">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:sun:sparc_enterprise_server:m4000"/>
        <cpe-lang:fact-ref name="cpe:/h:sun:sparc_enterprise_server:m5000"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:sun:sparc_enterprise_server:m4000</vuln:product>
      <vuln:product>cpe:/h:sun:sparc_enterprise_server:m5000</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0171</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-06-13T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-19T13:34:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-249126-1" xml:lang="en">249126</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33280" xml:lang="en">33280</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021602" xml:lang="en">1021602</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0207" xml:lang="en">ADV-2009-0207</vuln:reference>
    </vuln:references>
    <vuln:summary>The Sun SPARC Enterprise M4000 and M5000 Server, within a certain range of serial numbers, allows remote attackers to use the manufacturing root password, perform a root login to the eXtended System Control Facility Unit (aka XSCFU or Service Processor), and have unspecified other impact.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0172">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:ga"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:ga</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0172</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.593-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:49.047-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021591" xml:lang="en">1021591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33258" xml:lang="en">33258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0137" xml:lang="en">ADV-2009-0137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ37696" xml:lang="en">IZ37696</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21363936" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21363936</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47931" xml:lang="en">ibm-db2-connect-stream-dos(47931)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in IBM DB2 8 before FP17a, 9.1 before FP6a, and 9.5 before FP3a allows remote attackers to cause a denial of service (infinite loop) via a crafted CONNECT data stream.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0173">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp2:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp3:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:fp4a:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.1:ga"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:linux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:db2_universal_database:9.5:fp1:windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1::windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp2:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp3:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:fp4a:windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.1:ga</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5::windows</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:linux</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:db2_universal_database:9.5:fp1:windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0173</vuln:cve-id>
    <vuln:published-datetime>2009-01-16T16:30:03.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:49.110-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v82/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v91/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT" xml:lang="en">ftp://ftp.software.ibm.com/ps/products/db2/fixes/english-us/aparlist/db2_v95/APARLIST.TXT</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021591" xml:lang="en">1021591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33258" xml:lang="en">33258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0137" xml:lang="en">ADV-2009-0137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1IZ39652" xml:lang="en">IZ39652</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21363936" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21363936</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47934" xml:lang="en">ibm-db2-datastream-dos(47934)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the server in IBM DB2 8 before FP17a, 9.1 before FP6a, and 9.5 before FP3a allows remote authenticated users to cause a denial of service (trap) via a crafted data stream.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0174">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.49"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.49</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0174</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:00:08.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.917-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4918" xml:lang="en">4918</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33185" xml:lang="en">33185</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47851" xml:lang="en">vuplayer-asx-bo(47851)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7709" xml:lang="en">7709</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7713" xml:lang="en">7713</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7714" xml:lang="en">7714</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7715" xml:lang="en">7715</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in VUPlayer 2.49 allows remote attackers to execute arbitrary code via a long .asf URI in the HREF attribute of a REF element in a .asx file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0175">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:heathcosoft:mp3_trackmaker:1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:heathcosoft:mp3_trackmaker:1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0175</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:00:08.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:39.980-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4920" xml:lang="en">4920</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33183" xml:lang="en">33183</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47852" xml:lang="en">mp3trackmaker-mp3-bo(47852)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7708" xml:lang="en">7708</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Heathco Software MP3 TrackMaker 1.5 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long string in an invalid .mp3 file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0176">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_professional_software:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.3</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.4</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.5</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.6</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_professional_software:4.1.4</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.1</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.2</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0176</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:00:09.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-05-18T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-20T12:34:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=764" xml:lang="en">20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'symWidths' Heap Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=765" xml:lang="en">20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller 'bitmaps' Heap Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17118" xml:lang="en">http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17119" xml:lang="en">http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17119</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33224" xml:lang="en">33224</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple heap-based buffer overflows in the PDF distiller in the Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) 4.1.3 through 4.1.6, BlackBerry Professional Software 4.1.4, and BlackBerry Unite! before 1.0.3 bundle 28 allow user-assisted remote attackers to execute arbitrary code via (1) a crafted stream in a .pdf file, related to "symWidths"; or (2) a crafted data stream in a .pdf file, related to "bitmaps."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0177">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vmware:ace:2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:ace:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:fusion:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:server:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:1.05"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_player:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:4.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_workstation:6.51"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vmware:ace:2.5.0</vuln:product>
      <vuln:product>cpe:/a:vmware:ace:2.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:fusion:2.0.1</vuln:product>
      <vuln:product>cpe:/a:vmware:server:2.0.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.2</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.4</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.6</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.7</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.8</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.0.9</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:1.05</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0.2</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0.4</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.0.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_player:2.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:4.5.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.2</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.4</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.6</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.7</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:5.5.8</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0.2</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0.4</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.0.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_workstation:6.51</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0177</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:00:09.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:16.987-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6433" name="oval:org.mitre.oval:def:6433"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000054.html" xml:lang="en">[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://seclists.org/fulldisclosure/2009/Apr/0036.html" xml:lang="en">20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34373" xml:lang="en">34373</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021512" xml:lang="en">1021512</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0005.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0005.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0024" xml:lang="en">ADV-2009-0024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0944" xml:lang="en">ADV-2009-0944</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7647" xml:lang="en">7647</vuln:reference>
    </vuln:references>
    <vuln:summary>vmwarebase.dll, as used in the vmware-authd service (aka vmware-authd.exe), in VMware Workstation 6.5.1 build 126130, 6.5.1 and earlier; VMware Player 2.5.1 build 126130, 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 2.0.x before 2.0.1 build 156745; and VMware Fusion before 2.0.2 build 147997 allows remote attackers to cause a denial of service (daemon crash) via a long (1) USER or (2) PASS command.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0178">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:hardware_management_console:7.3.2.0:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:hardware_management_console:7.3.2.0:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0178</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:49.283-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33293" xml:lang="en">33293</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0158" xml:lang="en">ADV-2009-0158</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4521" xml:lang="en">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48010" xml:lang="en">ibm-hmc-unspecified(48010)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in IBM Hardware Management Console (HMC) 7 release 3.2.0 SP1 has unknown impact and attack vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0179">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-2"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-3"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-4"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-5"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.9-6"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.10-2"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.10-3"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.10-4"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.10-5"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-1"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-2"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-3"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-4"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-5"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.11-6"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:igno_saitz:libmikmod:3.2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-1</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-2</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-3</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-4</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-5</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.9-6</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.10-1</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.10-2</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.10-3</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.10-4</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.10-5</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-1</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-2</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-3</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-4</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-5</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.11-6</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.1.12</vuln:product>
      <vuln:product>cpe:/a:igno_saitz:libmikmod:3.2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0179</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-09-02T01:20:21.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" xml:lang="en">SUSE-SR:2009:006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/01/13/2" xml:lang="en">[oss-security] 20090113 CVE Request -- libmikmod</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33240" xml:lang="en">33240</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=479833" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=479833</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01305.html" xml:lang="en">FEDORA-2009-9095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01312.html" xml:lang="en">FEDORA-2009-9112</vuln:reference>
    </vuln:references>
    <vuln:summary>libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0180">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.3.3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7:pre-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7:pre-2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-4"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.0:rc-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:redhat:fedora:9"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.2.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:0.3.3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7:pre-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.7:pre-2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.8:rc-4"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.0:rc-1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:nfs:nfs-utils:1.1.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:redhat:fedora:10"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:nfs:nfs-utils:0.2</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:0.2.1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:0.3.1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:0.3.3</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.2</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.3</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.4</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.6</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.7</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.7:pre-1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.7:pre-2</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.8</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.8:rc-1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.8:rc-2</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.8:rc-3</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.8:rc-4</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.9</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.10</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.11</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.0.12</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.0</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.0:rc-1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.1</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.2</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.3</vuln:product>
      <vuln:product>cpe:/a:nfs:nfs-utils:1.1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0180</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:49.343-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33294" xml:lang="en">33294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=477864" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=477864</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48058" xml:lang="en">nfsutils-tcpwrapper-security-bypass(48058)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00376.html" xml:lang="en">FEDORA-2009-0266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00526.html" xml:lang="en">FEDORA-2009-0297</vuln:reference>
    </vuln:references>
    <vuln:summary>Certain Fedora build scripts for nfs-utils before 1.1.2-9.fc9 on Fedora 9, and before 1.1.4-6.fc10 on Fedora 10, omit TCP Wrapper support, which might allow remote attackers to bypass intended access restrictions, possibly a related issue to CVE-2008-1376.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0181">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vuplayer:vuplayer</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0181</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:30:00.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:34.143-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4921" xml:lang="en">4921</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499810/100/0/threaded" xml:lang="en">20090106 VUPLAYER BufferOver flow POC</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48169" xml:lang="en">vuplayer-file-bo(48169)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in VUPlayer allows user-assisted attackers to have an unknown impact via a long file, as demonstrated by a file composed entirely of 'A' characters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0182">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.41"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.42"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.43"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.44"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.45"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.46"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.47"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.48"/>
        <cpe-lang:fact-ref name="cpe:/a:vuplayer:vuplayer:2.49"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.1</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.2</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.3</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.4</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.5</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.6</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.7</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.8</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:0.9</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.0</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.1</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.2</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.3</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.4</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.5</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.6</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.7</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.8</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:1.9</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.0</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.1</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.2</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.3</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.4</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.11</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.21</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.22</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.23</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.41</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.42</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.43</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.44</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.45</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.46</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.47</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.48</vuln:product>
      <vuln:product>cpe:/a:vuplayer:vuplayer:2.49</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0182</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T11:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:40.120-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4923" xml:lang="en">4923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48170" xml:lang="en">vuplayer-fileline-bo(48170)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7695" xml:lang="en">7695</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in VUPlayer 2.49 and earlier allows user-assisted attackers to execute arbitrary code via a long URL in a File line in a .pls file, as demonstrated by an http URL on a File1 line.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0183">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:free_download_manager:free_download_manager:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:free_download_manager:free_download_manager:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:free_download_manager:free_download_manager:2.5</vuln:product>
      <vuln:product>cpe:/a:free_download_manager:free_download_manager:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0183</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:34.440-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500604/100/0/threaded" xml:lang="en">20090202 Secunia Research: Free Download Manager Remote Control Server Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33554" xml:lang="en">33554</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0302" xml:lang="en">ADV-2009-0302</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7986" xml:lang="en">7986</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Remote Control Server in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allows remote attackers to execute arbitrary code via a long Authorization header in an HTTP request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0184">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:free_download_manager:free_download_manager:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:free_download_manager:free_download_manager:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:free_download_manager:free_download_manager:2.5</vuln:product>
      <vuln:product>cpe:/a:free_download_manager:free_download_manager:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0184</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:35.020-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500605/100/0/threaded" xml:lang="en">20090202 Secunia Research: Free Download Manager Torrent Parsing Buffer Overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33555" xml:lang="en">33555</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0302" xml:lang="en">ADV-2009-0302</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in the torrent parsing implementation in Free Download Manager (FDM) 2.5 Build 758 and 3.0 Build 844 allow remote attackers to execute arbitrary code via (1) a long file name within a torrent file, (2) a long tracker URL in a torrent file, or (3) a long comment in a torrent file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0185">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2::vista"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2::vista</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0185</vuln:cve-id>
    <vuln:published-datetime>2009-06-02T14:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15727" name="oval:org.mitre.oval:def:15727"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html" xml:lang="en">APPLE-SA-2009-06-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3591" xml:lang="en">http://support.apple.com/kb/HT3591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504006/100/0/threaded" xml:lang="en">20090602 Secunia Research: Apple QuickTime MS ADPCM Encoding Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35163" xml:lang="en">35163</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022314" xml:lang="en">1022314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1469" xml:lang="en">ADV-2009-1469</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50894" xml:lang="en">quicktime-msadpcm-bo(50894)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted MS ADPCM encoded audio data in an AVI movie file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0186">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.55"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.541"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:0.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mega-nerd:libsndfile:1.0.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:0.0.8</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:0.0.28</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.0</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.0:rc6</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.10</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.11</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.12</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.13</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.14</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.15</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.16</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.17</vuln:product>
      <vuln:product>cpe:/a:mega-nerd:libsndfile:1.0.18</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.55</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.541</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0186</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:36.940-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" xml:lang="en">SUSE-SR:2009:008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-16.xml" xml:lang="en">GLSA-200904-16</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1742" xml:lang="en">DSA-1742</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mega-nerd.com/libsndfile/NEWS" xml:lang="en">http://www.mega-nerd.com/libsndfile/NEWS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501399/100/0/threaded" xml:lang="en">20090303 Secunia Research: Winamp CAF Processing Integer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501413/100/0/threaded" xml:lang="en">20090303 Secunia Research: libsndfile CAF Processing Integer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33963" xml:lang="en">33963</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021784" xml:lang="en">1021784</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-749-1" xml:lang="en">USN-749-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0584" xml:lang="en">ADV-2009-0584</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0585" xml:lang="en">ADV-2009-0585</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49038" xml:lang="en">libsndfile-caf-bo(49038)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0187">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:orbitdownloader:orbit_downloader:2.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:orbitdownloader:orbit_downloader:2.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:orbitdownloader:orbit_downloader:2.8.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:orbitdownloader:orbit_downloader:2.8.2</vuln:product>
      <vuln:product>cpe:/a:orbitdownloader:orbit_downloader:2.8.3</vuln:product>
      <vuln:product>cpe:/a:orbitdownloader:orbit_downloader:2.8.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0187</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:39.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501220/100/0/threaded" xml:lang="en">20090225 Secunia Research: Orbit Downloader Long URL Parsing Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33894" xml:lang="en">33894</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0521" xml:lang="en">ADV-2009-0521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48932" xml:lang="en">orbitdownloader-connecting-bo(48932)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Orbit Downloader 2.8.2 and 2.8.3, and possibly other versions before 2.8.5, allows remote attackers to execute arbitrary code via a crafted HTTP URL with a long host name, which is not properly handled when constructing a "Connecting" log message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0188">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:-"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:4.1.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:5.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.1.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.3.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.4.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:6.5.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.3:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.0.4:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.2:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.3:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.4:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.1.6:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2::vista"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.2.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.3.1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.1:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.4.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.0:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5:-:mac"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.5.5:-:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:quicktime:7.6.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:quicktime:-</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:4.1.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:5.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:6.5.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2::windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.0.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.2:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.3:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.4:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.1.6:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2::vista</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.2.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.3.1.70</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.1:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.4</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.4.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.0:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5:-:mac</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.5.5:-:windows</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.0</vuln:product>
      <vuln:product>cpe:/a:apple:quicktime:7.6.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0188</vuln:cve-id>
    <vuln:published-datetime>2009-06-02T14:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:17.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16085" name="oval:org.mitre.oval:def:16085"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Jun/msg00000.html" xml:lang="en">APPLE-SA-2009-06-01-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3591" xml:lang="en">http://support.apple.com/kb/HT3591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504007/100/0/threaded" xml:lang="en">20090602 Secunia Research: QuickTime Sorenson Video 3 Content Parsing Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35159" xml:lang="en">35159</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022314" xml:lang="en">1022314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1469" xml:lang="en">ADV-2009-1469</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50886" xml:lang="en">quicktime-sorensonvideo-code-execution(50886)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple QuickTime before 7.6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie composed of a Sorenson 3 video file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0189">
    <vuln:cve-id>CVE-2009-0189</vuln:cve-id>
    <vuln:published-datetime>2011-02-01T14:00:03.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-02-01T14:00:38.877-05:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-1012.  Reason: This candidate is a reservation duplicate of CVE-2009-1012.  Notes: All CVE users should reference CVE-2009-1012 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0190">
    <vuln:cve-id>CVE-2009-0190</vuln:cve-id>
    <vuln:published-datetime>2011-02-01T14:00:39.033-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-02-01T14:00:39.313-05:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-1016.  Reason: This candidate is a reservation duplicate of CVE-2009-1016.  Notes: All CVE users should reference CVE-2009-1016 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0191">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0.2009.1301"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:2.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0.2009.1301</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0191</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.547-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:41.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security.htm#Processing" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security.htm#Processing</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501590/100/0/threaded" xml:lang="en">20090309 Secunia Research: Foxit Reader JBIG2 Symbol Dictionary Processing Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34035" xml:lang="en">34035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021822" xml:lang="en">1021822</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0634" xml:lang="en">ADV-2009-0634</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49135" xml:lang="en">foxitreader-jbig2-code-execution(49135)</vuln:reference>
    </vuln:references>
    <vuln:summary>Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 3.0.2009.1301, does not properly handle a JBIG2 symbol dictionary segment with zero new symbols, which allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a dereference of an uninitialized memory location.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0192">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:edirectory:8.8:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:edirectory:8.8:sp3:ftf3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:edirectory:8.8:sp3</vuln:product>
      <vuln:product>cpe:/a:novell:edirectory:8.8:sp3:ftf3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0192</vuln:cve-id>
    <vuln:published-datetime>2009-07-14T16:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:41.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/viewContent.do?externalId=3426981" xml:lang="en">http://www.novell.com/support/viewContent.do?externalId=3426981</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504924/100/0/threaded" xml:lang="en">20090714 Secunia Research: Novell eDirectory iMonitor "Accept-Language" Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35666" xml:lang="en">35666</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1883" xml:lang="en">ADV-2009-1883</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/51703" xml:lang="en">edirectory-imonitor-acceptlanguage-bo(51703)</vuln:reference>
    </vuln:references>
    <vuln:summary>Off-by-one error in the iMonitor component in Novell eDirectory 8.8 SP3, 8.8 SP3 FTF3, and possibly other versions allows remote attackers to execute arbitrary code via an HTTP request with a crafted Accept-Language header, which triggers a stack-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0193">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0193</vuln:cve-id>
    <vuln:published-datetime>2009-03-24T21:30:00.390-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-08T15:27:53.853-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2018-11-07T09:57:57.653-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html" xml:lang="en">SUSE-SA:2009:014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-17.xml" xml:lang="en">GLSA-200904-17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1" xml:lang="en">256788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-04.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0376.html" xml:lang="en">RHSA-2009:0376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502155/100/0/threaded" xml:lang="en">20090325 Secunia Research: Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34229" xml:lang="en">34229</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021892" xml:lang="en">1021892</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1019" xml:lang="en">ADV-2009-1019</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 allows remote attackers to execute arbitrary code via a PDF file with a malformed JBIG2 symbol dictionary segment, a different vulnerability than CVE-2009-1061 and CVE-2009-1062.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0194">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:garmin:garmin_communicator_plugin:2.6.4.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:garmin:garmin_communicator_plugin:2.6.4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0194</vuln:cve-id>
    <vuln:published-datetime>2009-05-11T11:30:00.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:43.863-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022173" xml:lang="en">1022173</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503319/100/0/threaded" xml:lang="en">20090507 Secunia Research: Garmin Communicator Plug-In Domain Locking Security Bypass</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34858" xml:lang="en">34858</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50360" xml:lang="en">communicator-domain-security-bypass(50360)</vuln:reference>
    </vuln:references>
    <vuln:summary>The domain-locking implementation in the GARMINAXCONTROL.GarminAxControl_t.1 ActiveX control in npGarmin.dll in the Garmin Communicator Plug-In 2.6.4.0 does not properly enforce the restrictions that (1) download and (2) upload requests come from a web site specified by the user, which allows remote attackers to obtain sensitive information or reconfigure Garmin GPS devices via unspecified vectors related to a "synchronisation error."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0195">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:3.0.1</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0195</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.627-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10076" name="oval:org.mitre.oval:def:10076"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502759/100/0/threaded" xml:lang="en">20090417 Secunia Research: CUPS pdftops JBIG2 Symbol Dictionary Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502762/100/0/threaded" xml:lang="en">20090417 Secunia Research: Xpdf JBIG2 Symbol Dictionary Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34791" xml:lang="en">34791</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0196">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:0"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:5.50"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.07"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.54"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.56"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.57"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.60"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.61"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.62"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.63"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ghostscript:ghostscript:0</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:5.50</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.07</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.0.1</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15.2</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.54</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.56</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.57</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.60</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.61</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.62</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.63</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0196</vuln:cve-id>
    <vuln:published-datetime>2009-04-16T11:12:57.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:46.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10533" name="oval:org.mitre.oval:def:10533"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" xml:lang="en">SUSE-SR:2009:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201412-17.xml" xml:lang="en">GLSA-201412-17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1" xml:lang="en">262288</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0060" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0060</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:095" xml:lang="en">MDVSA-2009:095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0421.html" xml:lang="en">RHSA-2009:0421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502586/100/0/threaded" xml:lang="en">20090409 Secunia Research: Ghostscript jbig2dec JBIG2 Processing Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502757/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0060-1 ghostscript</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34445" xml:lang="en">34445</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022029" xml:lang="en">1022029</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0983" xml:lang="en">ADV-2009-0983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1708" xml:lang="en">ADV-2009-1708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/attachment.cgi?id=337747" xml:lang="en">https://bugzilla.redhat.com/attachment.cgi?id=337747</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/757-1/" xml:lang="en">USN-757-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html" xml:lang="en">FEDORA-2009-3709</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html" xml:lang="en">FEDORA-2009-3710</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0197">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:irfanview:formats:4.00"/>
        <cpe-lang:fact-ref name="cpe:/a:irfanview:formats:4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:irfanview:formats:4.20"/>
        <cpe-lang:fact-ref name="cpe:/a:irfanview:formats:4.22"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:irfanview:formats:4.00</vuln:product>
      <vuln:product>cpe:/a:irfanview:formats:4.10</vuln:product>
      <vuln:product>cpe:/a:irfanview:formats:4.20</vuln:product>
      <vuln:product>cpe:/a:irfanview:formats:4.22</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0197</vuln:cve-id>
    <vuln:published-datetime>2009-04-09T11:08:35.593-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:49.207-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.irfanview.com/plugins.htm" xml:lang="en">http://www.irfanview.com/plugins.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502516/100/0/threaded" xml:lang="en">20090407 Secunia Research: IrfanView Formats Plug-in XPM Parsing Integer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34402" xml:lang="en">34402</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0953" xml:lang="en">ADV-2009-0953</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49717" xml:lang="en">irfanview-formatsplugin-xpm-bo(49717)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the FORMATS Plugin before 4.23 for IrfanView allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large XPM file that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0198">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::elements"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:security_update:professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2:security_update"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::elements</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:security_update:professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2:security_update</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0198</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T11:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:49.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html" xml:lang="en">SUSE-SA:2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-06.xml" xml:lang="en">GLSA-200907-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022361" xml:lang="en">1022361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-07.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1109.html" xml:lang="en">RHSA-2009:1109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504217/100/0/threaded" xml:lang="en">20090610 Secunia Research: Adobe Reader JBIG2 Text Region Segment Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35274" xml:lang="en">35274</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35302" xml:lang="en">35302</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-161A.html" xml:lang="en">TA09-161A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1547" xml:lang="en">ADV-2009-1547</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/51015" xml:lang="en">reader-acrobat-jbig2-code-exec(51015)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF file that contains JBIG2 text region segments with Huffman encoding.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0199">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vmware:ace:2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:ace:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:ace:2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:movie_decoder:6.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:player:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:player:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:player:2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:player:2.5.2_build_156735"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:workstation:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:workstation:6.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:workstation:6.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:workstation:6.5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vmware:ace:2.5.0</vuln:product>
      <vuln:product>cpe:/a:vmware:ace:2.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:ace:2.5.2</vuln:product>
      <vuln:product>cpe:/a:vmware:movie_decoder:6.5.3</vuln:product>
      <vuln:product>cpe:/a:vmware:player:2.5</vuln:product>
      <vuln:product>cpe:/a:vmware:player:2.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:player:2.5.2</vuln:product>
      <vuln:product>cpe:/a:vmware:player:2.5.2_build_156735</vuln:product>
      <vuln:product>cpe:/a:vmware:workstation:6.5</vuln:product>
      <vuln:product>cpe:/a:vmware:workstation:6.5.0</vuln:product>
      <vuln:product>cpe:/a:vmware:workstation:6.5.1</vuln:product>
      <vuln:product>cpe:/a:vmware:workstation:6.5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0199</vuln:cve-id>
    <vuln:published-datetime>2009-09-08T18:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:51.943-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000065.html" xml:lang="en">[security-announce] 20090904 VMSA-2009-0012 VMware Movie Decoder, VMware Workstation, VMware Player, and VMware ACE resolve security issues.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/506286/100/0/threaded" xml:lang="en">20090905 VMSA-2009-0012 VMware Movie Decoder, VMware Workstation, VMware Player, and VMware ACE resolve security issues.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36290" xml:lang="en">36290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0012.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0012.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2553" xml:lang="en">ADV-2009-2553</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the VMnc media codec in vmnc.dll in VMware Movie Decoder before 6.5.3 build 185404, VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, and VMware ACE 2.5.x before 2.5.3 build 185404 on Windows might allow remote attackers to execute arbitrary code via a video file with crafted dimensions (aka framebuffer parameters).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0200">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.0-ru"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.84"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.87"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.91"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.93"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.95"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.100"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.104"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.113"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.118"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.122"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.130"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.156"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.9.680"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.1.152"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.1.154"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4.1::64-bit"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:605b"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:609"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:614"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:619"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:627"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:633"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:638"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:638c"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:641b"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:641d"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:643"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.0-ru</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.0.0</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.0.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.0.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.0.3.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1:beta2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1:rc1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1:rc3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.5</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.84</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.87</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.91</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.93</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.95</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.100</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.104</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.113</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.118</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.122</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.130</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.156</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.9.680</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.2:rc1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.2:rc2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.1.152</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.1.154</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.2.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.3.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4.1::64-bit</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:3.01</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:605b</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:609</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:614</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:619</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:627</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:633</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:638</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:638c</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:641b</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:641d</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:643</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0200</vuln:cve-id>
    <vuln:published-datetime>2009-09-02T13:30:00.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:52.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10881" name="oval:org.mitre.oval:def:10881"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://development.openoffice.org/releases/3.1.1.html" xml:lang="en">http://development.openoffice.org/releases/3.1.1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html" xml:lang="en">SUSE-SR:2009:015</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263508-1" xml:lang="en">263508</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020715.1-1" xml:lang="en">1020715</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1880" xml:lang="en">DSA-1880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" xml:lang="en">GLSA-201408-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:035" xml:lang="en">MDVSA-2010:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:091" xml:lang="en">MDVSA-2010:091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:105" xml:lang="en">MDVSA-2010:105</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openoffice.org/security/cves/CVE-2009-0200-0201.html" xml:lang="en">http://www.openoffice.org/security/cves/CVE-2009-0200-0201.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/506194/100/0/threaded" xml:lang="en">20090901 Secunia Research: OpenOffice.org Word Document Table Parsing Integer Underflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36200" xml:lang="en">36200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2490" xml:lang="en">ADV-2009-2490</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0201">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:2.4.1::64-bit"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.5</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.0.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.2.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.3.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4.1</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:2.4.1::64-bit</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0201</vuln:cve-id>
    <vuln:published-datetime>2009-09-02T13:30:00.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:54.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10726" name="oval:org.mitre.oval:def:10726"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://development.openoffice.org/releases/3.1.1.html" xml:lang="en">http://development.openoffice.org/releases/3.1.1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-09/msg00001.html" xml:lang="en">SUSE-SR:2009:015</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263508-1" xml:lang="en">263508</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020715.1-1" xml:lang="en">1020715</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1880" xml:lang="en">DSA-1880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" xml:lang="en">GLSA-201408-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:035" xml:lang="en">MDVSA-2010:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:091" xml:lang="en">MDVSA-2010:091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:105" xml:lang="en">MDVSA-2010:105</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openoffice.org/security/cves/CVE-2009-0200-0201.html" xml:lang="en">http://www.openoffice.org/security/cves/CVE-2009-0200-0201.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/506195/100/0/threaded" xml:lang="en">20090901 Secunia Research: OpenOffice.org Word Document Table Parsing Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36200" xml:lang="en">36200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022798" xml:lang="en">1022798</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2490" xml:lang="en">ADV-2009-2490</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0202">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0202</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T17:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:56.303-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022369" xml:lang="en">1022369</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504215/100/0/threaded" xml:lang="en">20090610 Secunia Research: Microsoft PowerPoint Freelance Layout Parsing Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35275" xml:lang="en">35275</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/51034" xml:lang="en">ms-powerpoint-freelance-bo(51034)</vuln:reference>
    </vuln:references>
    <vuln:summary>Array index error in FL21WIN.DLL in the PowerPoint Freelance Windows 2.1 Translator in Microsoft PowerPoint 2000 and 2002 allows remote attackers to execute arbitrary code via a Freelance file with unspecified "layout information" that triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0204">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:select_access:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:select_access:6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:select_access:6.1</vuln:product>
      <vuln:product>cpe:/a:hp:select_access:6.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0204</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.250-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123324765514459&amp;w=2" xml:lang="en">SSRT090007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021641" xml:lang="en">1021641</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33505" xml:lang="en">33505</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0296" xml:lang="en">ADV-2009-0296</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48334" xml:lang="en">selectaccess-unspecified-xss(48334)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in HP Select Access 6.1 and 6.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0206">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:hp:oncplus:b.11.31_01"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:oncplus:b.11.31_02"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:oncplus:b.11.31_03"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:oncplus:b.11.31_04"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:oncplus:b.11.31_05"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.31"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:oncplus:b.11.31_01</vuln:product>
      <vuln:product>cpe:/a:hp:oncplus:b.11.31_02</vuln:product>
      <vuln:product>cpe:/a:hp:oncplus:b.11.31_03</vuln:product>
      <vuln:product>cpe:/a:hp:oncplus:b.11.31_04</vuln:product>
      <vuln:product>cpe:/a:hp:oncplus:b.11.31_05</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0206</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T16:30:09.767-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.313-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33653" xml:lang="en">33653</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0350" xml:lang="en">ADV-2009-0350</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48556" xml:lang="en">hpux-nfs-dos(48556)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in NFS in HP ONCplus B.11.31.05 and earlier for HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0207">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsodm:3.5"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.31"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsodm:5.0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.23"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsodm:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsodm:5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsvxfs:4.1"/>
          <cpe-lang:fact-ref name="cpe:/a:oracle:vrtsvxfs:5.0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.11</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.23</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.31</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0207</vuln:cve-id>
    <vuln:published-datetime>2009-03-24T21:30:00.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:40.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6352" name="oval:org.mitre.oval:def:6352"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123792744311063&amp;w=2" xml:lang="en">HPSBUX02409</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34226" xml:lang="en">34226</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021891" xml:lang="en">1021891</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0823" xml:lang="en">ADV-2009-0823</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49403" xml:lang="en">hpux-veritas-unspecified-priv-escalation(49403)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP-UX B.11.11 running VERITAS Oracle Disk Manager (VRTSodm) 3.5, B.11.23 running VRTSodm 4.1 or VERITAS File System (VRTSvxfs) 4.1, B.11.23 running VRTSodm 5.0 or VRTSvxfs 5.0, and B.11.31 running VRTSodm 5.0 allows local users to gain root privileges via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0208">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:virtual_rooms:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:virtual_rooms:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:virtual_rooms:6.0</vuln:product>
      <vuln:product>cpe:/a:hp:virtual_rooms:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0208</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T18:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-10-09T18:57:49.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123567121722181&amp;w=2" xml:lang="en">SSRT080135</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP Virtual Rooms Client before 7.0.1, when running on Windows, allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0209">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:3.4.363.97"/>
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:3.4.370"/>
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:3.4.375.99:sp2:32bit_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:osisoft:pi_server:3.4.375.99:sp2:64bit_windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:osisoft:pi_server:2.4</vuln:product>
      <vuln:product>cpe:/a:osisoft:pi_server:2.6</vuln:product>
      <vuln:product>cpe:/a:osisoft:pi_server:3.4.363.97</vuln:product>
      <vuln:product>cpe:/a:osisoft:pi_server:3.4.370</vuln:product>
      <vuln:product>cpe:/a:osisoft:pi_server:3.4.375.99:sp2:32bit_windows</vuln:product>
      <vuln:product>cpe:/a:osisoft:pi_server:3.4.375.99:sp2:64bit_windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0209</vuln:cve-id>
    <vuln:published-datetime>2009-10-01T11:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:56.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/506826/100/0/threaded" xml:lang="en">20090930 C4 SCADA Security Advisory - OSISoft PI Server Authentication Weakness</vuln:reference>
    </vuln:references>
    <vuln:summary>PI Server in OSIsoft PI System before 3.4.380.x does not properly use encryption in the default authentication process, which allows remote attackers to read or modify information in databases via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0210">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.5</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.6</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0210</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:57.037-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/337569" xml:lang="en">VU#337569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.scada-security.com/vulnerabilities/areva1.html" xml:lang="en">http://www.scada-security.com/vulnerabilities/areva1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500689/100/0/threaded" xml:lang="en">20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33637" xml:lang="en">33637</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the MLF application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service (system crash) via unspecified vectors, aka PD28578.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0211">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.5</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.6</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0211</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:57.410-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/337569" xml:lang="en">VU#337569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.scada-security.com/vulnerabilities/areva1.html" xml:lang="en">http://www.scada-security.com/vulnerabilities/areva1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500689/100/0/threaded" xml:lang="en">20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33637" xml:lang="en">33637</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32018.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0212">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.5</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.6</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0212</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:57.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/337569" xml:lang="en">VU#337569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.scada-security.com/vulnerabilities/areva1.html" xml:lang="en">http://www.scada-security.com/vulnerabilities/areva1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500689/100/0/threaded" xml:lang="en">20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33637" xml:lang="en">33637</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32020.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0213">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.5</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.6</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0213</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:58.160-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/337569" xml:lang="en">VU#337569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.scada-security.com/vulnerabilities/areva1.html" xml:lang="en">http://www.scada-security.com/vulnerabilities/areva1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500689/100/0/threaded" xml:lang="en">20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33637" xml:lang="en">33637</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the NETIO application in AREVA e-terrahabitat 5.7 and earlier allows remote attackers to cause a denial of service (system crash) via unknown vectors, aka PD32021.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0214">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:areva:e-terrahabitat:5.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.5</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.6</vuln:product>
      <vuln:product>cpe:/a:areva:e-terrahabitat:5.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0214</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:58.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/337569" xml:lang="en">VU#337569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.scada-security.com/vulnerabilities/areva1.html" xml:lang="en">http://www.scada-security.com/vulnerabilities/areva1.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500689/100/0/threaded" xml:lang="en">20090205 C4 SCADA Security Advisory - AREVA e-terrahabitat / e-terraplatform Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33637" xml:lang="en">33637</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the WebFGServer application in AREVA e-terrahabitat 5.7 and earlier allows remote authenticated users to gain privileges via unknown vectors, aka PD32022.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0215">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:access_support_activex_control:3.20.284.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:access_support_activex_control:3.20.284.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0215</vuln:cve-id>
    <vuln:published-datetime>2009-03-25T11:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.453-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/340420" xml:lang="en">VU#340420</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34228" xml:lang="en">34228</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0824" xml:lang="en">ADV-2009-0824</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49409" xml:lang="en">ibm-access-activex-bo(49409)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the GetXMLValue method in the IBM Access Support ActiveX control in IbmEgath.dll, as distributed on IBM and Lenovo computers, allows remote attackers to execute arbitrary code via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0216">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ge_fanuc:ifix:5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ge_fanuc:ifix:2.0</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:2.2</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:2.5</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:2.6</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:2.21</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:3.0</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:3.5</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:4.0</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:4.5</vuln:product>
      <vuln:product>cpe:/a:ge_fanuc:ifix:5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0216</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.517-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.gefanuc.com/support/index?page=kbchannel&amp;id=S:KB13253&amp;actp=search" xml:lang="en">http://support.gefanuc.com/support/index?page=kbchannel&amp;id=S:KB13253&amp;actp=search</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/310355" xml:lang="en">VU#310355</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.mcgrewsecurity.com/2009/02/10/ge-fanuc-releases-info-on-ifix-vulnerabilities-vu-310355/" xml:lang="en">http://www.mcgrewsecurity.com/2009/02/10/ge-fanuc-releases-info-on-ifix-vulnerabilities-vu-310355/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33739" xml:lang="en">33739</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48691" xml:lang="en">gefanucifix-multiple-unauth-access(48691)</vuln:reference>
    </vuln:references>
    <vuln:summary>GE Fanuc iFIX 5.0 and earlier relies on client-side authentication involving a weakly encrypted local password file, which allows remote attackers to bypass intended access restrictions and start privileged server login sessions by recovering a password or by using a modified program module.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0217">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2::fp17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.32"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mono_project:mono:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:application_server:10.1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:application_server:10.1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:application_server:10.1.4.3im"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:8.1:sp6"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:9.2:mp3"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:10.0:mp1"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:bea_product_suite:10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:8.1:sp6"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:9.2:mp3"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:10.0:mp1"/>
        <cpe-lang:fact-ref name="cpe:/a:oracle:weblogic_server_component:10.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2::fp17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.24</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.28</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.30</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.31</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.32</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.33</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.1</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.2</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.3</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.4</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.5</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.2.6</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:1.9</vuln:product>
      <vuln:product>cpe:/a:mono_project:mono:2.0</vuln:product>
      <vuln:product>cpe:/a:oracle:application_server:10.1.2.3</vuln:product>
      <vuln:product>cpe:/a:oracle:application_server:10.1.3.4</vuln:product>
      <vuln:product>cpe:/a:oracle:application_server:10.1.4.3im</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:8.1:sp6</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:9.0</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:9.1</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:9.2:mp3</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:10.0:mp1</vuln:product>
      <vuln:product>cpe:/a:oracle:bea_product_suite:10.3</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:8.1:sp6</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:9.0</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:9.1</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:9.2:mp3</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:10.0:mp1</vuln:product>
      <vuln:product>cpe:/a:oracle:weblogic_server_component:10.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0217</vuln:cve-id>
    <vuln:published-datetime>2009-07-14T19:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:49:44.190-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186" name="oval:org.mitre.oval:def:10186"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158" name="oval:org.mitre.oval:def:7158"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717" name="oval:org.mitre.oval:def:8717"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161" xml:lang="en">http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7" xml:lang="en">http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7" xml:lang="en">http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" xml:lang="en">APPLE-SA-2009-09-03-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" xml:lang="en">SUSE-SA:2009:053</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html" xml:lang="en">SUSE-SA:2010:017</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=125787273209737&amp;w=2" xml:lang="en">HPSBUX02476</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1" xml:lang="en">263429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1" xml:lang="en">269208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1" xml:lang="en">1020710</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?revision=794013&amp;view=revision" xml:lang="en">http://svn.apache.org/viewvc?revision=794013&amp;view=revision</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.aleksey.com/xmlsec/" xml:lang="en">http://www.aleksey.com/xmlsec/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2010/dsa-1995" xml:lang="en">DSA-1995</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml" xml:lang="en">GLSA-201408-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/466161" xml:lang="en">VU#466161</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ" xml:lang="en">http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/WDON-7TY529" xml:lang="en">http://www.kb.cert.org/vuls/id/WDON-7TY529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" xml:lang="en">MDVSA-2009:209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mono-project.com/Vulnerabilities" xml:lang="en">http://www.mono-project.com/Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openoffice.org/security/cves/CVE-2009-0217.html" xml:lang="en">http://www.openoffice.org/security/cves/CVE-2009-0217.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1694.html" xml:lang="en">RHSA-2009:1694</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35671" xml:lang="en">35671</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022561" xml:lang="en">1022561</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022567" xml:lang="en">1022567</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022661" xml:lang="en">1022661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-903-1" xml:lang="en">USN-903-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-294A.html" xml:lang="en">TA09-294A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA10-159B.html" xml:lang="en">TA10-159B</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1900" xml:lang="en">ADV-2009-1900</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1908" xml:lang="en">ADV-2009-1908</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1909" xml:lang="en">ADV-2009-1909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1911" xml:lang="en">ADV-2009-1911</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2543" xml:lang="en">ADV-2009-2543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3122" xml:lang="en">ADV-2009-3122</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0366" xml:lang="en">ADV-2010-0366</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0635" xml:lang="en">ADV-2010-0635</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.w3.org/2008/06/xmldsigcore-errata.html#e03" xml:lang="en">http://www.w3.org/2008/06/xmldsigcore-errata.html#e03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html" xml:lang="en">http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=180&amp;context=SSEQTP&amp;dc=D400&amp;uid=swg24023545&amp;loc=en_US&amp;cs=UTF-8&amp;lang=en&amp;rss=ct180websphere" xml:lang="en">PK80596</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=180&amp;context=SSEQTP&amp;dc=D400&amp;uid=swg24023723&amp;loc=en_US&amp;cs=UTF-8&amp;lang=en&amp;rss=ct180websphere" xml:lang="en">PK80627</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=180&amp;uid=swg21384925" xml:lang="en">http://www-01.ibm.com/support/docview.wss?rs=180&amp;uid=swg21384925</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=511915" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=511915</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041" xml:lang="en">MS10-041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.apache.org/bugzilla/show_bug.cgi?id=47526" xml:lang="en">https://issues.apache.org/bugzilla/show_bug.cgi?id=47526</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.apache.org/bugzilla/show_bug.cgi?id=47527" xml:lang="en">https://issues.apache.org/bugzilla/show_bug.cgi?id=47527</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1200.html" xml:lang="en">RHSA-2009:1200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1201.html" xml:lang="en">RHSA-2009:1201</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1428.html" xml:lang="en">RHSA-2009:1428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1636.html" xml:lang="en">RHSA-2009:1636</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1637.html" xml:lang="en">RHSA-2009:1637</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1649.html" xml:lang="en">RHSA-2009:1649</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1650.html" xml:lang="en">RHSA-2009:1650</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/826-1/" xml:lang="en">USN-826-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" xml:lang="en">FEDORA-2009-8329</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" xml:lang="en">FEDORA-2009-8337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html" xml:lang="en">FEDORA-2009-8456</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html" xml:lang="en">FEDORA-2009-8473</vuln:reference>
    </vuln:references>
    <vuln:summary>The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0218">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ldra:tbbrowse"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:particlesoftware:intralaunch:-"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:particlesoftware:intralaunch:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0218</vuln:cve-id>
    <vuln:published-datetime>2009-04-13T12:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.563-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/908801" xml:lang="en">VU#908801</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/MAPG-7PYRP4" xml:lang="en">http://www.kb.cert.org/vuls/id/MAPG-7PYRP4</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/WDON-7Q4RZN" xml:lang="en">http://www.kb.cert.org/vuls/id/WDON-7Q4RZN</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34395" xml:lang="en">34395</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49684" xml:lang="en">intralaunch-activex-code-execution(49684)</vuln:reference>
    </vuln:references>
    <vuln:summary>Insecure method vulnerability in Particle Software IntraLaunch Application Launcher ActiveX control in IntraLaunch.ocx, as used in LDRA TBbrowse and possibly other products, allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0219">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_professional_software:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_unite:1.0.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.3</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.4</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.5</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_enterprise_server:4.1.6</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_professional_software:4.1.4</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.1</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.2</vuln:product>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_unite:1.0.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0219</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T20:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-05T01:53:18.063-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=766" xml:lang="en">20090113 RIM BlackBerry Enterprise Server Attachment Service PDF Distiller Uninitialized Memory Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17118" xml:lang="en">http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17119" xml:lang="en">http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB17119</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33250" xml:lang="en">33250</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021559" xml:lang="en">1021559</vuln:reference>
    </vuln:references>
    <vuln:summary>The PDF distiller in the Attachment Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) 4.1.3 through 4.1.6, BlackBerry Professional Software 4.1.4, and BlackBerry Unite! before 1.0.3 bundle 28 performs delete operations on uninitialized pointers, which allows user-assisted remote attackers to execute arbitrary code via a crafted data stream in a .pdf file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0220">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0220</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:08.817-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5610" name="oval:org.mitre.oval:def:5610"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=790" xml:lang="en">20090512 Microsoft PowerPoint PPT 4.0 Importer Multiple Stack Buffer Overflow Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34833" xml:lang="en">34833</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in the PowerPoint 4.0 importer (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allow remote attackers to execute arbitrary code via crafted formatting data for paragraphs in a file that uses a PowerPoint 4.0 native file format, related to (1) an incorrect calculation from a record header, or (2) an interget that is used to specify the number of bytes to copy, aka "Legacy File Format Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0221">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0221</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:09.613-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6127" name="oval:org.mitre.oval:def:6127"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=796" xml:lang="en">20090512 Microsoft PowerPoint Integer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34835" xml:lang="en">34835</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in Microsoft Office PowerPoint 2002 SP3 and 2003 SP3 allows remote attackers to execute arbitrary code via a PowerPoint file containing a crafted record type for "collaboration information for different slides" that contains a field that specifies a large number of records, which triggers an under-allocated buffer and a heap-based buffer overflow, aka "Integer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0222">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0222</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:10.393-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6143" name="oval:org.mitre.oval:def:6143"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34831" xml:lang="en">34831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.vupen.com/exploits/Microsoft_PowerPoint_Memory_Corruption_Code_Execution_Exploit_MS09_017_1290124.php" xml:lang="en">http://www.vupen.com/exploits/Microsoft_PowerPoint_Memory_Corruption_Code_Execution_Exploit_MS09_017_1290124.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.vupen.com/exploits/Microsoft_PowerPoint_Pointer_Overwrite_Code_Execution_Exploit_MS09_017_1290123.php" xml:lang="en">http://www.vupen.com/exploits/Microsoft_PowerPoint_Pointer_Overwrite_Code_Execution_Exploit_MS09_017_1290123.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to a "pointer overwrite" and memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0223, CVE-2009-0226, CVE-2009-0227, and CVE-2009-1137.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0223">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0223</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:11.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6269" name="oval:org.mitre.oval:def:6269"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34834" xml:lang="en">34834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0226, CVE-2009-0227, and CVE-2009-1137.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0224">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:compatibility_pack_word_excel_powerpoint:2007"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint_viewer:2003"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint_viewer:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint_viewer:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:powerpoint:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:powerpoint:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:works:8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:works:9.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:compatibility_pack_word_excel_powerpoint:2007</vuln:product>
      <vuln:product>cpe:/a:microsoft:compatibility_pack_word_excel_powerpoint:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007:::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint_viewer:2003</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint_viewer:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint_viewer:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:powerpoint:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:powerpoint:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:works:8.5</vuln:product>
      <vuln:product>cpe:/a:microsoft:works:9.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0224</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:12.113-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6023" name="oval:org.mitre.oval:def:6023"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=793" xml:lang="en">20090512 Microsoft PowerPoint Build List Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34879" xml:lang="en">34879</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; PowerPoint Viewer 2003 and 2007 SP1 and SP2; PowerPoint in Microsoft Office 2004 for Mac and 2008 for Mac; Open XML File Format Converter for Mac; Microsoft Works 8.5 and 9.0; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 do not properly validate PowerPoint files, which allows remote attackers to execute arbitrary code via multiple crafted BuildList records that include ChartBuild containers, which triggers memory corruption, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0225">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0225</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:12.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5526" name="oval:org.mitre.oval:def:5526"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34880" xml:lang="en">34880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.vupen.com/exploits/Microsoft_PowerPoint_Array_Indexing_Code_Execution_Exploit_MS09_017_1290125.php" xml:lang="en">http://www.vupen.com/exploits/Microsoft_PowerPoint_Array_Indexing_Code_Execution_Exploit_MS09_017_1290125.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office PowerPoint 2002 SP3 allows remote attackers to execute arbitrary code via crafted sound data in a file that uses a PowerPoint 95 native file format, leading to improper "array indexing" and memory corruption, aka "PP7 Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0226">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0226</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:13.863-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6106" name="oval:org.mitre.oval:def:6106"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=789" xml:lang="en">20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34881" xml:lang="en">34881</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the PowerPoint 4.2 conversion filter in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a long string in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0227, and CVE-2009-1137.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0227">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0227</vuln:cve-id>
    <vuln:published-datetime>2009-05-12T18:30:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:14.690-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6239" name="oval:org.mitre.oval:def:6239"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=787" xml:lang="en">20090512 Microsoft PowerPoint 4.2 Conversion Filter Stack Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34882" xml:lang="en">34882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022205" xml:lang="en">1022205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the PowerPoint 4.2 conversion filter (PP4X32.DLL) in Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3 allows remote attackers to execute arbitrary code via a large number of structures in sound data in a file that uses a PowerPoint 4.0 native file format, leading to memory corruption, aka "Legacy File Format Vulnerability," a different vulnerability than CVE-2009-0222, CVE-2009-0223, CVE-2009-0226, and CVE-2009-1137.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0228">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0228</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:15.487-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6317" name="oval:org.mitre.oval:def:6317"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=806" xml:lang="en">20090609 Microsoft Windows 2000 Print Spooler Remote Stack Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35206" xml:lang="en">35206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022352" xml:lang="en">1022352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1541" xml:lang="en">ADV-2009-1541</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022" xml:lang="en">MS09-022</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0229">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000:sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server:sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server:sp2::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server:sp2::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:-:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000:sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server:sp2::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server:sp2::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:-:sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0229</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:57.340-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5815" name="oval:org.mitre.oval:def:5815"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35208" xml:lang="en">35208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022352" xml:lang="en">1022352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1541" xml:lang="en">ADV-2009-1541</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022" xml:lang="en">MS09-022</vuln:reference>
    </vuln:references>
    <vuln:summary>The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0230">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008::~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008::~sp2~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008::~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008::~sp2~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0230</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:17.270-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6287" name="oval:org.mitre.oval:def:6287"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35209" xml:lang="en">35209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022352" xml:lang="en">1022352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1541" xml:lang="en">ADV-2009-1541</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022" xml:lang="en">MS09-022</vuln:reference>
    </vuln:references>
    <vuln:summary>The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0231">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:professional_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:professional_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0231</vuln:cve-id>
    <vuln:published-datetime>2009-07-15T11:30:01.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5457" name="oval:org.mitre.oval:def:5457"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=811" xml:lang="en">20090714 Microsoft Embedded OpenType Font Engine (T2EMBED.DLL) Heap Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022543" xml:lang="en">1022543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-195A.html" xml:lang="en">TA09-195A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1887" xml:lang="en">ADV-2009-1887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029" xml:lang="en">MS09-029</vuln:reference>
    </vuln:references>
    <vuln:summary>The Embedded OpenType (EOT) Font Engine (T2EMBED.DLL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table in a data record that triggers an integer truncation and a heap-based buffer overflow, aka "Embedded OpenType Font Heap Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0232">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:-:sp2:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-:sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:professional_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:-:sp2:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:professional_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0232</vuln:cve-id>
    <vuln:published-datetime>2009-07-15T11:30:01.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5678" name="oval:org.mitre.oval:def:5678"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022543" xml:lang="en">1022543</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-195A.html" xml:lang="en">TA09-195A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1887" xml:lang="en">ADV-2009-1887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029" xml:lang="en">MS09-029</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table, aka "Embedded OpenType Font Integer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0233">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0233</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6228" name="oval:org.mitre.oval:def:6228"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33982" xml:lang="en">33982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021831" xml:lang="en">1021831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0661" xml:lang="en">ADV-2009-0661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008" xml:lang="en">MS09-008</vuln:reference>
    </vuln:references>
    <vuln:summary>The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not reuse cached DNS responses in all applicable situations, which makes it easier for remote attackers to predict transaction IDs and poison caches by simultaneously sending crafted DNS queries and responses, aka "DNS Server Query Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0234">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0234</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5715" name="oval:org.mitre.oval:def:5715"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/319331" xml:lang="en">VU#319331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33988" xml:lang="en">33988</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021831" xml:lang="en">1021831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-069A.html" xml:lang="en">TA09-069A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0661" xml:lang="en">ADV-2009-0661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-008" xml:lang="en">MS09-008</vuln:reference>
    </vuln:references>
    <vuln:summary>The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008 does not properly cache crafted DNS responses, which makes it easier for remote attackers to predict transaction IDs and poison caches by sending many crafted DNS queries that trigger "unnecessary lookups," aka "DNS Server Response Validation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0235">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0235</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.563-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:21.567-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5893" name="oval:org.mitre.oval:def:5893"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=783" xml:lang="en">20090414 Microsoft WordPad Word97 Converter Stack Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34470" xml:lang="en">34470</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022043" xml:lang="en">1022043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1024" xml:lang="en">ADV-2009-1024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-010" xml:lang="en">MS09-010</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the Word 97 text converter in WordPad in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted Word 97 file that triggers memory corruption, related to use of inconsistent integer data sizes for an unspecified length field, aka "WordPad Word 97 Text Converter Stack Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0236">
    <vuln:cve-id>CVE-2009-0236</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.103-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.120-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0237">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:forefront_threat_management_gateway:-:-:medium_business"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:standard"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2006:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_security_and_acceleration_server:2006:supportability"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:forefront_threat_management_gateway:-:-:medium_business</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:enterprise</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2004:sp3:standard</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2006:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_security_and_acceleration_server:2006:supportability</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0237</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:22.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5771" name="oval:org.mitre.oval:def:5771"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022046" xml:lang="en">1022046</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1030" xml:lang="en">ADV-2009-1030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016" xml:lang="en">MS09-016</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in cookieauth.dll in the HTML forms authentication component in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2006, 2006 Supportability Update, and 2006 SP1; allows remote attackers to inject arbitrary web script or HTML via "authentication input" to this component, aka "Cross-Site Scripting Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0238">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:gold"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:excel:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:gold</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0238</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T11:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:23.473-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5968" name="oval:org.mitre.oval:def:5968"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blogs.zdnet.com/security/?p=2658" xml:lang="en">http://blogs.zdnet.com/security/?p=2658</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5923" xml:lang="en">http://isc.sans.org/diary.html?storyid=5923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021744" xml:lang="en">1021744</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/968272.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/968272.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33870" xml:lang="en">33870</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99" xml:lang="en">http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-022310-4202-99</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1023" xml:lang="en">ADV-2009-1023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009" xml:lang="en">MS09-009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48875" xml:lang="en">ms-excel-unspecified-code-execution(48875)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Excel 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1; Excel Viewer 2003 Gold and SP3; Excel Viewer; Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1; and Excel in Microsoft Office 2004 and 2008 for Mac allow remote attackers to execute arbitrary code via a crafted Excel document that triggers an access attempt on an invalid object, as exploited in the wild in February 2009 by Trojan.Mdropper.AC.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0239">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:professional_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_search:4.0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:windows_search:4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0239</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5428" name="oval:org.mitre.oval:def:5428"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022353" xml:lang="en">1022353</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1542" xml:lang="en">ADV-2009-1542</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-023" xml:lang="en">MS09-023</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Windows Search 4.0 for Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows user-assisted remote attackers to inject arbitrary web script or HTML via a crafted file that appears in a preview in a search result, aka "Script Execution in Windows Search Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0240">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tigris:websvn:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tigris:websvn:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0240</vuln:cve-id>
    <vuln:published-datetime>2009-01-20T21:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:50.720-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512191</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1725" xml:lang="en">DSA-1725</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-20.xml" xml:lang="en">GLSA-200903-20</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/18/2" xml:lang="en">[oss-security] 20090118 CVE request: WebSVN</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48171" xml:lang="en">websvn-listing-information-disclosure(48171)</vuln:reference>
    </vuln:references>
    <vuln:summary>listing.php in WebSVN 2.0 and possibly 1.7 beta, when using an SVN authz file, allows remote authenticated users to read changelogs or diffs for restricted projects via a modified repname parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0241">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ganglia:ganglia:3.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ganglia:ganglia:3.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0241</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T06:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-13T01:30:40.780-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223" xml:lang="en">http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" xml:lang="en">SUSE-SR:2009:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-22.xml" xml:lang="en">GLSA-200903-22</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/ganglia-developers@lists.sourceforge.net/msg04929.html" xml:lang="en">[Ganglia-developers] 20090113 patches for: [Sec] Gmetad server BoF and network overload + [Feature] multiple requests per conn on interactive port</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33299" xml:lang="en">33299</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the process_path function in gmetad/server.c in Ganglia 3.1.1 allows remote attackers to cause a denial of service (crash) via a request to the gmetad service with a long pathname.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0242">
    <vuln:cve-id>CVE-2009-0242</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T06:30:04.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2016-12-15T21:59:02.083-05:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  gmetad in Ganglia 3.1.1, when supporting multiple requests per connection on an interactive port, allows remote attackers to cause a denial of service via a request to the gmetad service with a path that does not exist, which causes Ganglia to (1) perform excessive CPU computation and (2) send the entire tree, which consumes network bandwidth.  NOTE: the vendor and original researcher have disputed this issue, since legitimate requests can generate the same amount of resource consumption.  CVE concurs with the dispute, so this identifier should not be used.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0243">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::professional_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:professional_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::professional_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:professional_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0243</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5695" xml:lang="en">http://isc.sans.org/diary.html?storyid=5695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021629" xml:lang="en">1021629</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-020A.html" xml:lang="en">TA09-020A</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Windows does not properly enforce the Autorun and NoDriveTypeAutoRun registry values, which allows physically proximate attackers to execute arbitrary code by (1) inserting CD-ROM media, (2) inserting DVD media, (3) connecting a USB device, and (4) connecting a Firewire device; (5) allows user-assisted remote attackers to execute arbitrary code by mapping a network drive; and allows user-assisted attackers to execute arbitrary code by clicking on (6) an icon under My Computer\Devices with Removable Storage and (7) an option in an AutoPlay dialog, related to the Autorun.inf file.  NOTE: vectors 1 and 3 on Vista are already covered by CVE-2008-0951.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0244">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:5.0::pocket_pc"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:5.0::smartphone"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:6.0::pro"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_mobile:6.0::standard"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_mobile:5.0</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_mobile:5.0::pocket_pc</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_mobile:5.0::smartphone</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_mobile:6.0</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_mobile:6.0::pro</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_mobile:6.0::standard</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0244</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T15:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:58.927-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4938" xml:lang="en">4938</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500199/100/0/threaded" xml:lang="en">20090119 Microsoft Bluetooth Stack OBEX Directory Traversal</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33359" xml:lang="en">33359</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html" xml:lang="en">http://www.seguridadmobile.com/windows-mobile/windows-mobile-security/Microsoft-Bluetooth-Stack-Directory-Traversal.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48124" xml:lang="en">winmobile-obexftp-directory-traversal(48124)</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the OBEX FTP Service in the Microsoft Bluetooth stack in Windows Mobile 6 Professional, and probably Windows Mobile 5.0 for Pocket PC and 5.0 for Pocket PC Phone Edition, allows remote authenticated users to list arbitrary directories, and create or read arbitrary files, via a .. (dot dot) in a pathname.  NOTE: this can be leveraged for code execution by writing to a Startup folder.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0245">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:usagi:mynets:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:usagi:mynets:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:usagi:mynets:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:usagi:mynets:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:usagi:mynets:1.2.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:usagi:mynets:1.0.0</vuln:product>
      <vuln:product>cpe:/a:usagi:mynets:1.0.1</vuln:product>
      <vuln:product>cpe:/a:usagi:mynets:1.1.0</vuln:product>
      <vuln:product>cpe:/a:usagi:mynets:1.2.0</vuln:product>
      <vuln:product>cpe:/a:usagi:mynets:1.2.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0245</vuln:cve-id>
    <vuln:published-datetime>2009-01-21T21:30:01.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-22T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-22T11:09:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN36802959/index.html" xml:lang="en">JVN#36802959</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000001.html" xml:lang="en">JVNDB-2009-000001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://usagi-project.org/PRESS/archives/57" xml:lang="en">http://usagi-project.org/PRESS/archives/57</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33145" xml:lang="en">33145</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Usagi Project MyNETS 1.2.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2008-4629.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0246">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:easyhdr:easyhdr:1.60.2::pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:easyhdr:easyhdr:1.60.2::pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0246</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:00:59.457-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://easyhdr.com/version.php" xml:lang="en">http://easyhdr.com/version.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4941" xml:lang="en">4941</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500192/100/0/threaded" xml:lang="en">20090120 Secunia Research: EasyHDR Pro Radiance RGBE Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33363" xml:lang="en">33363</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0190" xml:lang="en">ADV-2009-0190</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48119" xml:lang="en">easyhdrpro-hdr-bo(48119)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in easyHDR PRO 1.60.2 allows user-assisted attackers to execute arbitrary code via an invalid Radiance RGBE (aka .hdr) file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0247">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:53kf:web_im_2009:_nil_:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:53kf:web_im_2009:_nil_:home"/>
        <cpe-lang:fact-ref name="cpe:/a:53kf:web_im_2009:_nil_:professional"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:53kf:web_im_2009:_nil_:enterprise</vuln:product>
      <vuln:product>cpe:/a:53kf:web_im_2009:_nil_:home</vuln:product>
      <vuln:product>cpe:/a:53kf:web_im_2009:_nil_:professional</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0247</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:00.223-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500169/100/0/threaded" xml:lang="en">20090119 53KF Web IM 2009 Cross-Site Scripting Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33341" xml:lang="en">33341</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48096" xml:lang="en">53kfwebim-msg-xss(48096)</vuln:reference>
    </vuln:references>
    <vuln:summary>The server for 53KF Web IM 2009 Home, Professional, and Enterprise editions relies on client-side protection mechanisms against cross-site scripting (XSS), which allows remote attackers to conduct XSS attacks by using a modified client to send a crafted IM message, related to the msg variable.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0248">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:rankem"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:rankem</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0248</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33324" xml:lang="en">33324</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48071" xml:lang="en">rankem-rankup-xss(48071)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48072" xml:lang="en">rankem-siteid-xss(48072)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7805" xml:lang="en">7805</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in rankup.asp in Katy Whitton RankEm allows remote attackers to inject arbitrary web script or HTML via the siteID parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0249">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:rankem"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:rankem</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0249</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.653-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48070" xml:lang="en">rankem-topsites-information-disclosure(48070)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7805" xml:lang="en">7805</vuln:reference>
    </vuln:references>
    <vuln:summary>Katy Whitton RankEm stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for database/topsites.mdb.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0250">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ryneezy:phosheezy:0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ryneezy:phosheezy:0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0250</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4935" xml:lang="en">4935</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48056" xml:lang="en">phosheezy-configpassword-info-disclosure(48056)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7780" xml:lang="en">7780</vuln:reference>
    </vuln:references>
    <vuln:summary>Ryneezy phoSheezy 0.2 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the file containing the administrator's password hash via a direct request for config/password.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0251">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ryneezy:phosheezy:0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ryneezy:phosheezy:0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0251</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4935" xml:lang="en">4935</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7780" xml:lang="en">7780</vuln:reference>
    </vuln:references>
    <vuln:summary>Static code injection vulnerability in admin.php in Ryneezy phoSheezy 0.2 allows remote authenticated administrators to inject arbitrary PHP code into config/footer via the footer parameter.  NOTE: this can be exploited by unauthenticated attackers by leveraging CVE-2009-0250. NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0252">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:enthrallweb:ereservations"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:enthrallweb:ereservations</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0252</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T11:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.823-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33321" xml:lang="en">33321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48062" xml:lang="en">ereservations-login-sql-injection(48062)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7801" xml:lang="en">7801</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field).  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0253">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0253</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T13:30:03.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.870-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/4936" xml:lang="en">4936</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48212" xml:lang="en">firefox-onclickaction-click-hijacking(48212)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7842" xml:lang="en">7842</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox 3.0.5 allows remote attackers to trick a user into visiting an arbitrary URL via an onclick action that moves a crafted element to the current mouse position, related to a "Status Bar Obfuscation" and "Clickjacking" attack.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0254">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:easyhdr:easyhdr:1.60.2::pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:easyhdr:easyhdr:1.60.2::pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0254</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T13:30:03.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:10.470-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://easyhdr.com/version.php" xml:lang="en">http://easyhdr.com/version.php</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33363" xml:lang="en">33363</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0190" xml:lang="en">ADV-2009-0190</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in easyHDR PRO 1.60.2 allows user-assisted attackers to execute arbitrary code via an invalid Flexible Image Transport System (FITS) file.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0255">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0255</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T18:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:51.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1711" xml:lang="en">DSA-1711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33376" xml:lang="en">33376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48132" xml:lang="en">typo3-installtool-weak-security(48132)</vuln:reference>
    </vuln:references>
    <vuln:summary>The System extension Install tool in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 creates the encryption key with an insufficiently random seed, which makes it easier for attackers to crack the key.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0256">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0256</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T18:30:04.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:51.593-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1711" xml:lang="en">DSA-1711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33376" xml:lang="en">33376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48133" xml:lang="en">typo3-library-session-hijacking(48133)</vuln:reference>
    </vuln:references>
    <vuln:summary>Session fixation vulnerability in the authentication library in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to hijack web sessions via unspecified vectors related to (1) frontend and (2) backend authentication.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0257">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0257</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T18:30:04.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:51.657-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1711" xml:lang="en">DSA-1711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33376" xml:lang="en">33376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48133" xml:lang="en">typo3-library-session-hijacking(48133)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48135" xml:lang="en">typo3-indexedsearchengine-xss(48135)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48136" xml:lang="en">typo3-workspace-xss(48136)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48137" xml:lang="en">typo3-adodb-xss(48137)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) name and (2) content of indexed files to the (a) Indexed Search Engine (indexed_search) system extension; (b) unspecified test scripts in the ADOdb system extension; and (c) unspecified vectors in the Workspace module.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0258">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0258</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T18:30:04.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:51.703-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-001/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1711" xml:lang="en">DSA-1711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/23/4" xml:lang="en">[oss-security] 20090123 Re: CVE id request: typo3 SA-2009-001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33376" xml:lang="en">33376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48138" xml:lang="en">typo3-indexedsearch-command-execution(48138)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Indexed Search Engine (indexed_search) system extension in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to execute arbitrary commands via a crafted filename containing shell metacharacters, which is not properly handled by the command-line indexer.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0259">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openoffice:openoffice.org:1.1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.2</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.3</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.4</vuln:product>
      <vuln:product>cpe:/a:openoffice:openoffice.org:1.1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0259</vuln:cve-id>
    <vuln:published-datetime>2009-01-22T18:30:04.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.933-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://milw0rm.com/sploits/2008-crash.doc.rar" xml:lang="en">http://milw0rm.com/sploits/2008-crash.doc.rar</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/21/9" xml:lang="en">[oss-security] 20090121 CVE Request -- openoffice.org (CVE-2008-4841)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33383" xml:lang="en">33383</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48213" xml:lang="en">openoffice-wordprocessor-code-execution(48213)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/6560" xml:lang="en">6560</vuln:reference>
    </vuln:references>
    <vuln:summary>The Word processor in OpenOffice.org 1.1.2 through 1.1.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) .doc, (2) .wri, or (3) .rtf Word 97 file that triggers memory corruption, as exploited in the wild in December 2008, as demonstrated by 2008-crash.doc.rar, and a similar issue to CVE-2008-4841.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0260">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.3_rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.3_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.5_rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.3</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.7</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.8</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.9</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.10</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:0.11</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.0</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.2.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.2.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.0</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.3</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.3_rc1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.3_rc2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.4</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.5</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.5_rc1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.5a</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.6</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.7</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.5.8</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.6</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.6.0</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.6.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.6.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.6.3</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.7.0</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.7.1</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.7.2</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.7.3</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0260</vuln:cve-id>
    <vuln:published-datetime>2009-01-23T14:00:05.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:00.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1" xml:lang="en">http://hg.moinmo.in/moin/1.8/rev/8cb4d34ccbc1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moinmo.in/SecurityFixes#moin1.8.1" xml:lang="en">http://moinmo.in/SecurityFixes#moin1.8.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500197/100/0/threaded" xml:lang="en">20090120 MoinMoin Wiki Engine XSS Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33365" xml:lang="en">33365</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0195" xml:lang="en">ADV-2009-0195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48126" xml:lang="en">moinmoin-attachfilepy-xss(48126)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/716-1/" xml:lang="en">USN-716-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="https://www.debian.org/security/2009/dsa-1715" xml:lang="en">DSA-1715</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin before 1.8.1 allow remote attackers to inject arbitrary web script or HTML via an AttachFile action to the WikiSandBox component with (1) the rename parameter or (2) the drawing parameter (aka the basename variable).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0261">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:effectmatrix:total_video_player:1.31"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:effectmatrix:total_video_player:1.31</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0261</vuln:cve-id>
    <vuln:published-datetime>2009-01-23T14:00:05.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:42.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33373" xml:lang="en">33373</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48140" xml:lang="en">totalvideoplayer-defaultskin-bo(48140)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7839" xml:lang="en">7839</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in EffectMatrix Total Video Player 1.31 allows user-assisted attackers to execute arbitrary code via a Skins\DefaultSkin\DefaultSkin.ini file with a large ColumnHeaderSpan value.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0262">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:trilogic:media_player:7"/>
        <cpe-lang:fact-ref name="cpe:/a:trilogic:media_player:8.0.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:trilogic:media_player:7</vuln:product>
      <vuln:product>cpe:/a:trilogic:media_player:8.0.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0262</vuln:cve-id>
    <vuln:published-datetime>2009-01-23T14:00:05.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.067-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33221" xml:lang="en">33221</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0097" xml:lang="en">ADV-2009-0097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7737" xml:lang="en">7737</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Triologic Media Player 7 and 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3u playlist file.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0263">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.5e"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.6x"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.7x"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.50"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.60"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.60::full"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.60::lite"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.61"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.61::full"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.62"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.62::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.64"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.64::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.65"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.70"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.70::full"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.71"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.72"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.73"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.73::full"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.74"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.75"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.76"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.77"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.78"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.79"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.80"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.81"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.90"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.91"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:2.95"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.01"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.02"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.03"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.03a"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.04"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.05"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.06"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.07"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08:c"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08:d"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08:e"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08c"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08d"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.08e"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.09"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.31"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.32"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.33"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.34"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.35"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.36"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.51"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.52"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.53"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.54"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.091"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.093"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.094"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.111"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.112"/>
        <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.541"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:nullsoft:winamp:2.0</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.4</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.5e</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.6x</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.7x</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.10</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.24</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.50</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.60</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.60::full</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.60::lite</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.61</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.61::full</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.62</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.62::standard</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.64</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.64::standard</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.65</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.70</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.70::full</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.71</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.72</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.73</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.73::full</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.74</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.75</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.76</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.77</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.78</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.79</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.80</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.81</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.90</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.91</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:2.95</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:3.0</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:3.1</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.0</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.0.1</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.0.2</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.01</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.02</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.03</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.03a</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.04</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.05</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.06</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.07</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08:c</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08:d</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08:e</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08c</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08d</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.08e</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.09</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.11</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.12</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.13</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.21</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.22</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.23</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.24</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.31</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.32</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.33</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.34</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.35</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.36</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.51</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.52</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.53</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.54</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.091</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.093</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.094</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.111</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.112</vuln:product>
      <vuln:product>cpe:/a:nullsoft:winamp:5.541</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0263</vuln:cve-id>
    <vuln:published-datetime>2009-01-23T14:00:05.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14756" name="oval:org.mitre.oval:def:14756"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33226" xml:lang="en">33226</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0113" xml:lang="en">ADV-2009-0113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7742" xml:lang="en">7742</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Winamp 5.541 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a large Common Chunk (COMM) header value in an AIFF file and (2) a large invalid value in an MP3 file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0264">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.7</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8a</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.9</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0264</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:51.987-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html" xml:lang="en">http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33644" xml:lang="en">33644</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48315" xml:lang="en">systemcast-registrytool-bo(48315)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the Registry Setting Tool in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier has unknown impact and attack vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0265">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.5:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:4.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.2:p7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:8.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.2:p3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.3.5-p2-w1:windows"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:rc2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:bind:4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.5:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.8</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.9</vuln:product>
      <vuln:product>cpe:/a:isc:bind:4.9.10</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.1.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.1.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.2:p7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.2.7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.3.6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.4.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.4.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.4.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:8.4.7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.0.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.1.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.2:p3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.2.9</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.3.5-p2-w1:windows</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.1:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.1:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:rc2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0265</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:02.357-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33" xml:lang="en">http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.540362" xml:lang="en">SSA:2009-014-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:037" xml:lang="en">MDVSA-2009:037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0043" xml:lang="en">ADV-2009-0043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.isc.org/node/373" xml:lang="en">https://www.isc.org/node/373</vuln:reference>
    </vuln:references>
    <vuln:summary>Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077 and CVE-2009-0025.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0266">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:trilogic:media_player:8.0.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:trilogic:media_player:8.0.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0266</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-26T10:30:04.920-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-26T11:47:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:summary>Stack-based buffer overflow in Triologic Media Player 8.0.0.0 allows user-assisted remote attackers to execute arbitrary code via a long string in a .m3l playlist file.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0267">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0267</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.153-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6116" name="oval:org.mitre.oval:def:6116"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-113451-15-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-113451-15-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-247406-1" xml:lang="en">247406</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-032.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-032.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33407" xml:lang="en">33407</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48178" xml:lang="en">sun-solaris-libike-dos(48178)</vuln:reference>
    </vuln:references>
    <vuln:summary>libike in Sun Solaris 9 and 10, and OpenSolaris before snv_100, does not properly check packets, which allows remote attackers to cause a denial of service (in.iked daemon crash) via an unspecified IKE packet, a different vulnerability than CVE-2007-2989.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0268">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0268</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6061" name="oval:org.mitre.oval:def:6061"/>
    <vuln:cwe id="CWE-362"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-113685-07-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-113685-07-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-249586-1" xml:lang="en">249586</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-034.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-034.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33406" xml:lang="en">33406</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021640" xml:lang="en">1021640</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48179" xml:lang="en">solaris-pseudo-terminal-dos(48179)</vuln:reference>
    </vuln:references>
    <vuln:summary>Race condition in the pseudo-terminal (aka pty) driver module in Sun Solaris 8 through 10, and OpenSolaris before snv_103, allows local users to cause a denial of service (panic) via unspecified vectors related to lack of "properly sequenced code" in ptc and ptsl.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0269">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0269</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T10:30:04.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:01.833-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169" name="oval:org.mitre.oval:def:8169"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944" name="oval:org.mitre.oval:def:8944"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=a17d5232de7b53d34229de79ec22f4bb04adb7e4" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=a17d5232de7b53d34229de79ec22f4bb04adb7e4</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.1" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:118" xml:lang="en">MDVSA-2009:118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0360.html" xml:lang="en">RHSA-2009:0360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33412" xml:lang="en">33412</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48188" xml:lang="en">linux-kernel-readlink-bo(48188)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.launchpad.net/ecryptfs-devel/msg00010.html" xml:lang="en">[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.launchpad.net/ecryptfs-devel/msg00011.html" xml:lang="en">[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it</vuln:reference>
    </vuln:references>
    <vuln:summary>fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0270">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.7</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8a</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.9</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0270</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T14:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:06.037-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html" xml:lang="en">http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500172/100/0/threaded" xml:lang="en">20090119 [Wintercore Research ] Fujitsu SystemcastWizard Lite PXEService Remote Buffer Overflow.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33342" xml:lang="en">33342</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0176" xml:lang="en">ADV-2009-0176</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.wintercore.com/advisories/advisory_W010109.html" xml:lang="en">http://www.wintercore.com/advisories/advisory_W010109.html</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in PXEService.exe in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to execute arbitrary code via a large PXE protocol request in a UDP packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0271">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:systemcastwizard_lite:2.0a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.7</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.8a</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:1.9</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0</vuln:product>
      <vuln:product>cpe:/a:fujitsu:systemcastwizard_lite:2.0a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0271</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T14:30:00.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:12.953-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html" xml:lang="en">http://www.fujitsu.com/global/services/computing/server/primequest/products/os/windows-server-2008-2.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33344" xml:lang="en">33344</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0176" xml:lang="en">ADV-2009-0176</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the TFTP service in Fujitsu SystemcastWizard Lite 2.0A, 2.0, 1.9, and earlier allows remote attackers to read arbitrary files via directory traversal sequences in unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0272">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.01"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.02x"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03:hp1a"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:6.5</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.01</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.02x</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03:hp1a</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0272</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T17:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:06.553-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002319" xml:lang="en">http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002319</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-21" xml:lang="en">http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-21</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500569/100/0/threaded" xml:lang="en">20090130 PR08-21: Cross-site Request Forgery (CSRF) on Novell GroupWise WebAccess allows email theft and other attacks</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Novell GroupWise WebAccess 6.5x, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 allows remote attackers to insert e-mail forwarding rules, and modify unspecified other configuration settings, as arbitrary users via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0273">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.01"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.02x"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03:hp1a"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:6.5</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.01</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.02x</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03:hp1a</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0273</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T17:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:06.913-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002320" xml:lang="en">http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002320</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002321" xml:lang="en">http://www.novell.com/support/search.do?usemicrosite=true&amp;searchString=7002321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22" xml:lang="en">http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-22</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23" xml:lang="en">http://www.procheckup.com/vulnerability_manager/vulnerabilities/pr08-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500572/100/0/threaded" xml:lang="en">20090130 PR08-22: Persistent XSS on Novell GroupWise WebAccess</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500575/100/0/threaded" xml:lang="en">20090130 PR08-23: XSS on Novell GroupWise WebAccess</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33537" xml:lang="en">33537</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33541" xml:lang="en">33541</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Novell GroupWise WebAccess 6.5x, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 allow remote attackers to inject arbitrary web script or HTML via the (1) User.id and (2) Library.queryText parameters to gw/webacc, and other vectors involving (3) HTML e-mail and (4) HTML attachments.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0274">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.01"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.02x"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03:hp1a"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:6.5</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.01</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.02x</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03:hp1a</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0274</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-03T14:30:00.313-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-03T14:54:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/viewContent.do?externalId=7002322" xml:lang="en">http://www.novell.com/support/viewContent.do?externalId=7002322</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33559" xml:lang="en">33559</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in WebAccess in Novell GroupWise 6.5, 7.0, 7.01, 7.02x, 7.03, 7.03HP1a, and 8.0 might allow remote attackers to obtain sensitive information via a crafted URL, related to conversion of POST requests to GET requests.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0275">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ryneezy:phosheezy:0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ryneezy:phosheezy:0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0275</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T15:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-26T15:30:00.313-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-26T16:22:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:summary>Static code injection vulnerability in admin.php in Ryneezy phoSheezy 0.2 allows remote authenticated administrators to inject arbitrary PHP code into config/header via the header parameter.  NOTE: this can be exploited by unauthenticated attackers by leveraging CVE-2009-0250. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0276">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0276</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-04T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-04T08:30:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://codereview.chromium.org/18531" xml:lang="en">http://codereview.chromium.org/18531</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html" xml:lang="en">http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes" xml:lang="en">http://sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=8524" xml:lang="en">http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=8524</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-domain vulnerability in the V8 JavaScript engine in Google Chrome before 1.0.154.46 allows remote attackers to bypass the Same Origin Policy via a crafted script that accesses another frame and reads its full URL and possibly other sensitive information, or modifies the URL of this frame.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0277">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
          <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
          <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:sun:ultrasparc:t2"/>
          <cpe-lang:fact-ref name="cpe:/h:sun:ultrasparc:t2_plus"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0277</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T21:30:00.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:52.330-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-250066-1" xml:lang="en">250066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33398" xml:lang="en">33398</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0209" xml:lang="en">ADV-2009-0209</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48164" xml:lang="en">solaris-ultrasparct2-dos(48164)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the kernel in OpenSolaris snv_100 through snv_102 on the Sun UltraSPARC T2 and T2+ sun4v platforms allows local users to cause a denial of service (panic) via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0278">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.1::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.1::sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.1::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.1::x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.2::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.2::sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.2::windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_application_server:8.2::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.1::linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.1::sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.1::windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.1::x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.2::linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.2::sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.2::windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_application_server:8.2::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0278</vuln:cve-id>
    <vuln:published-datetime>2009-01-26T21:30:04.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:52.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-119166-35-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-119166-35-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-245446-1" xml:lang="en">245446</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33397" xml:lang="en">33397</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0208" xml:lang="en">ADV-2009-0208</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48161" xml:lang="en">javasystem-webinf-metainf-info-disclosure(48161)</vuln:reference>
    </vuln:references>
    <vuln:summary>Sun Java System Application Server (AS) 8.1 and 8.2 allows remote attackers to read the Web Application configuration files in the (1) WEB-INF or (2) META-INF directory via a malformed request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0279">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.01b"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.01c"/>
        <cpe-lang:fact-ref name="cpe:/a:pardalcms:pardalcms:0.2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.1.1</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.1.2</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.1.3</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.1a</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.01b</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.01c</vuln:product>
      <vuln:product>cpe:/a:pardalcms:pardalcms:0.2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0279</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.403-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33404" xml:lang="en">33404</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48175" xml:lang="en">pardalcms-comentar-sql-injection(48175)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7851" xml:lang="en">7851</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in comentar.php in Pardal CMS 0.2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0280">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:asp-project:asp-project:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:asp-project:asp-project:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0280</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:07.867-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500292/100/0/threaded" xml:lang="en">20090122 Asp-project Cookie Handling</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33401" xml:lang="en">33401</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48172" xml:lang="en">aspproject-cookie-security-bypass(48172)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7850" xml:lang="en">7850</vuln:reference>
    </vuln:references>
    <vuln:summary>Asp Project Management 1.0 allows remote attackers to bypass authentication and gain administrative access by setting the crypt cookie to 1.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0281">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:warhound:walking_club"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:warhound:walking_club</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0281</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.513-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33317" xml:lang="en">33317</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48061" xml:lang="en">walkingclub-login-sql-injection(48061)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7802" xml:lang="en">7802</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.aspx in WarHound Walking Club allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0282">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:ralinktech:rt73:3.08"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000:-"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:ralinktech:rt73:3.08</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0282</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:57.433-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512995" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512995</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-08.xml" xml:lang="en">GLSA-200907-08</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1712" xml:lang="en">DSA-1712</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1713" xml:lang="en">DSA-1713</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1714" xml:lang="en">DSA-1714</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500168/100/0/threaded" xml:lang="en">20090118 Ralinktech wireless cards drivers vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33340" xml:lang="en">33340</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in Ralink Technology USB wireless adapter (RT73) 3.08 for Windows, and other wireless card drivers including rt2400, rt2500, rt2570, and rt61, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Probe Request packet with a long SSID, possibly related to an integer signedness error.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0283">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:aobosoft:oblog"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:aobosoft:oblog</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0283</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:10.023-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500349/100/0/threaded" xml:lang="en">20090123 Oblog XSS valnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500397/100/0/threaded" xml:lang="en">20090124 Re: Oblog XSS valnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33416" xml:lang="en">33416</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in err.asp in Oblog allows remote attackers to inject arbitrary web script or HTML via the message parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0284">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:flaxweb:flax_article_manager:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:flaxweb:flax_article_manager:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0284</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.560-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.flaxweb.com/products/articles" xml:lang="en">http://www.flaxweb.com/products/articles</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33422" xml:lang="en">33422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7862" xml:lang="en">7862</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in category.php in Flax Article Manager 1.1 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0285">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bbsxp:bbsxp:5.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bbsxp:bbsxp:5.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0285</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:10.337-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500336/100/0/threaded" xml:lang="en">20090123 BBSxp Xss vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33411" xml:lang="en">33411</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48187" xml:lang="en">bbsxp-error-xss(48187)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in error.asp in BBSXP 5.13 and earlier allows remote attackers to inject arbitrary web script or HTML via the message parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0286">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:opengoo:opengoo:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0286</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33421" xml:lang="en">33421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7863" xml:lang="en">7863</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in upgrade/index.php in OpenGoo 1.1, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the form_data[script_class] parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0287">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:keep_toolkit:keep_toolkit:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:keep_toolkit:keep_toolkit:2.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:keep_toolkit:keep_toolkit:2.1</vuln:product>
      <vuln:product>cpe:/a:keep_toolkit:keep_toolkit:2.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0287</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T13:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-27T14:11:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://keeptoolkit.svn.sourceforge.net/viewvc/keeptoolkit?view=rev&amp;revision=56" xml:lang="en">http://keeptoolkit.svn.sourceforge.net/viewvc/keeptoolkit?view=rev&amp;revision=56</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=655845&amp;group_id=227492" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=655845&amp;group_id=227492</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33425" xml:lang="en">33425</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in lib/patUser.php in KEEP Toolkit before 2.5.1 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0288">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:windows_tftp_utility:tftputil:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:windows_tftp_utility:tftputil:1.3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:windows_tftp_utility:tftputil:1.2.0</vuln:product>
      <vuln:product>cpe:/a:windows_tftp_utility:tftputil:1.3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0288</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T14:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:10.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=894598" xml:lang="en">http://sourceforge.net/forum/forum.php?forum_id=894598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-directory-traversal" xml:lang="en">http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-directory-traversal</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500106/100/0/threaded" xml:lang="en">20090115 TFTPUtil GUI TFTP Directory Traversal</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33287" xml:lang="en">33287</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48019" xml:lang="en">tftputil-tftpget-directory-traversal(48019)</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to read arbitrary files outside the TFTP root directory via directory traversal sequences in a GET request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0289">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:windows_tftp_utility:tftputil:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:windows_tftp_utility:tftputil:1.3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:windows_tftp_utility:tftputil:1.2.0</vuln:product>
      <vuln:product>cpe:/a:windows_tftp_utility:tftputil:1.3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0289</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T14:30:02.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:11.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=894598" xml:lang="en">http://sourceforge.net/forum/forum.php?forum_id=894598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-server-denial-of-servi?blog=1" xml:lang="en">http://www.princeofnigeria.org/blogs/index.php/2009/01/14/tftputil-gui-tftp-server-denial-of-servi?blog=1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500107/100/0/threaded" xml:lang="en">20090115 TFTPUtil GUI TFTP Server Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33289" xml:lang="en">33289</vuln:reference>
    </vuln:references>
    <vuln:summary>k23productions TFTPUtil GUI 1.2.0 and 1.3.0 allows remote attackers to cause a denial of service (service crash) via a long filename in a crafted request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0290">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sir:gnuboard:4.31.03"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sir:gnuboard:4.31.03</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0290</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T14:30:02.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33304" xml:lang="en">33304</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48015" xml:lang="en">gnuboard-common-file-include(48015)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7792" xml:lang="en">7792</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in common.php in SIR GNUBoard 4.31.03 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the g4_path parameter.  NOTE: in some environments, this can be leveraged for remote code execution via a data: URI or a UNC share pathname.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0291">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openx:openx:2.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openx:openx:2.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0291</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:04.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:11.427-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500411/100/0/threaded" xml:lang="en">20090127 OpenX 2.6.3 - Local File Inclusion</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33458" xml:lang="en">33458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7883" xml:lang="en">7883</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in fc.php in OpenX 2.6.3 allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the MAX_type parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0292">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:shop-inet:shop-inet:4.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:shop-inet:shop-inet:4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0292</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:04.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.793-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7874" xml:lang="en">7874</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in show_cat2.php in SHOP-INET 4 allows remote attackers to execute arbitrary SQL commands via the grid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0293">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wazzum:wazzum_dating_software:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wazzum:wazzum_dating_software:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0293</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.857-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33461" xml:lang="en">33461</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7877" xml:lang="en">7877</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in profile_view.php in Wazzum Dating Software, possibly 2.0, allows remote attackers to execute arbitrary SQL commands via the userid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0294">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:webmobo:wbnews:2.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:webmobo:wbnews:2.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0294</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:11.710-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500398/100/0/threaded" xml:lang="en">20090125 WB News v2.0.X Remote File include ..</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33434" xml:lang="en">33434</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in WB News 2.0.1, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the config[installdir] parameter to (1) search.php, (2) archive.php, (3) comments.php, and (4) news.php; (5) News.php, (6) SendFriend.php, (7) Archive.php, and (8) Comments.php in base/; and possibly other components, different vectors than CVE-2007-1288.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0295">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:itlpoll:itpoll:2.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:itlpoll:itpoll:2.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0295</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.903-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33452" xml:lang="en">33452</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7867" xml:lang="en">7867</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Information Technology Light Poll Information (ITLPoll) 2.7 Stable 2, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0296">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gempar:script_toko_online:5.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gempar:script_toko_online:5.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0296</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.063-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:43.967-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7873" xml:lang="en">7873</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in shop_display_products.php in Script Toko Online 5.01 allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0297">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:clicktech:clickauction:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:clicktech:clickauction:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0297</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.013-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7880" xml:lang="en">7880</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login_check.asp in ClickAuction allows remote attackers to execute arbitrary SQL commands via the (1) txtEmail and (2) txtPassword parameters.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0298">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mw6_technologies:barcode_activex:3.0.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mw6_technologies:barcode_activex:3.0.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0298</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.110-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.073-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33451" xml:lang="en">33451</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7869" xml:lang="en">7869</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in MW6 Technologies Barcode ActiveX control (Barcode.MW6Barcode.1, Barcode.dll) 3.0.0.1 allows remote attackers to execute arbitrary code via a long Supplement property.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0299">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:groonesworld:glinks:2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:groonesworld:glinks:2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0299</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.137-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33460" xml:lang="en">33460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7878" xml:lang="en">7878</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/9236" xml:lang="en">9236</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Groone GLinks 2.1 allows remote attackers to execute arbitrary SQL commands via the cat parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0300">
    <vuln:cve-id>CVE-2009-0300</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-29T02:01:17.733-05:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2006-2636.  Reason: This candidate is a duplicate of CVE-2006-2636.  Notes: All CVE users should reference CVE-2006-2636 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0301">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:grid2000:flexcell_grid_control:5.6.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:grid2000:flexcell_grid_control:5.6.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0301</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.157-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33453" xml:lang="en">33453</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7868" xml:lang="en">7868</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple insecure method vulnerabilities in the FlexCell.Grid ActiveX control (FlexCell.ocx) in FlexCell Grid Control 5.6.9 allow remote attackers to create and overwrite arbitrary files via the (1) SaveFile and (2) ExportToXML methods.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0302">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php-nuke:downloads_module:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php-nuke:downloads_module:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0302</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:11.977-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://1337day.com/exploits/15481" xml:lang="en">http://1337day.com/exploits/15481</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/18148" xml:lang="en">18148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500335/100/0/threaded" xml:lang="en">20090123 PHP-Nuke 8.0 Downloads Blind Sql Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33410" xml:lang="en">33410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/50770" xml:lang="en">50770</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48186" xml:lang="en">downloads-module-sql-injection(48186)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/71475" xml:lang="en">phpnuke-uri-sql-injection(71475)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Downloads module for PHP-Nuke 8.0 8.1.0.3.5b and earlier allows remote authenticated users to execute arbitrary SQL commands via the url parameter in the Add operation to modules.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0303">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.0.22"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.3.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:8.4.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:webhelpdesk:web_help_desk:9.1.17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.0.20</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.0.21</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.0.22</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.7</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.8</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.9</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.0.10</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.1.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.1.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.1.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.1.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.1.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.3.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.3.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.3.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.3.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.4.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.4.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.2.4.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.0.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.0.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.0.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.0.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.0.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.1.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.1.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.1.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.3.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.3.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.3.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.3.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.4.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.4.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.4.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.5.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.3.6.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.7</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.8</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.1.9</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.2.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.2.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.2.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.2.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.3.7</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.5.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.5.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.3</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.7</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.8</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:8.4.6.10</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.0</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.1</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.2</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.4</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.5</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.6</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.7</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.8</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.9</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.10</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.11</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.12</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.13</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.14</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.15</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.16</vuln:product>
      <vuln:product>cpe:/a:webhelpdesk:web_help_desk:9.1.17</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0303</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-01-28T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-01-28T10:37:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://updates.webhelpdesk.com/weblog/updates/StableReleases/2009/01/23/911812309.html" xml:lang="en">http://updates.webhelpdesk.com/weblog/updates/StableReleases/2009/01/23/911812309.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33429" xml:lang="en">33429</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Web Help Desk before 9.1.18 allows remote attackers to inject arbitrary web script or HTML via vectors related to "encoded JavaScript" and Helpdesk.woa.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0304">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101b"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101b</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0304</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T15:30:05.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.293-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://lists.grok.org.uk/pipermail/full-disclosure/2009-January/067709.html" xml:lang="en">20090126 Solaris Devs Are Smoking Pot</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021635" xml:lang="en">1021635</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-251006-1" xml:lang="en">251006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33435" xml:lang="en">33435</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0232" xml:lang="en">ADV-2009-0232</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48208" xml:lang="en">sun-solaris-ipv6packets-dos(48208)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7865" xml:lang="en">7865</vuln:reference>
    </vuln:references>
    <vuln:summary>The kernel in Sun Solaris 10 and 11 snv_101b, and OpenSolaris before snv_108, allows remote attackers to cause a denial of service (system crash) via a crafted IPv6 packet, related to an "insufficient validation security vulnerability," as demonstrated by SunOSipv6.c.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0305">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:research_in_motion_limited:blackberry_application_web_loader:1.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:research_in_motion_limited:blackberry_application_web_loader:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0305</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-17T01:57:01.953-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blackberry.com/btsc/KB16248" xml:lang="en">http://blackberry.com/btsc/KB16248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/131100" xml:lang="en">VU#131100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/960715.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/960715.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33663" xml:lang="en">33663</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in the Research in Motion RIM AxLoader ActiveX control in AxLoader.ocx and AxLoader.dll in BlackBerry Application Web Loader 1.0 allow remote attackers to execute arbitrary code via unspecified use of the (1) load or (2) loadJad method.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0306">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_desktop_software:5.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:lotus_notes_intellisync"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:lotus_notes_intellisync</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_desktop_software:5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0306</vuln:cve-id>
    <vuln:published-datetime>2009-11-04T10:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-11-12T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-11-04T11:16:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB19701" xml:lang="en">http://www.blackberry.com/btsc/search.do?cmd=displayKC&amp;docType=kc&amp;externalId=KB19701</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36903" xml:lang="en">36903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3133" xml:lang="en">ADV-2009-3133</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the IBM Lotus Notes Intellisync ActiveX control in lnresobject.dll in BlackBerry Desktop Manager in Research In Motion (RIM) BlackBerry Desktop Software before 5.0.1 allows remote attackers to execute arbitrary code via a crafted web page.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0307">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.0:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:rim:blackberry_enterprise_server:4.1.6:mr4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.0</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.0:sp3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.0.3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1:sp3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1.3</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1.4</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1.5</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1.6</vuln:product>
      <vuln:product>cpe:/a:rim:blackberry_enterprise_server:4.1.6:mr4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0307</vuln:cve-id>
    <vuln:published-datetime>2009-04-22T14:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-28T01:37:41.627-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0170.html" xml:lang="en">20090417 ERNW Security Advisory 01-2009: XSS in Blackberries Mobile Data Service Connection Service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.blackberry.com/btsc/dynamickc.do?externalId=KB17969&amp;sliceID=1&amp;command=show&amp;forward=nonthreadedKC&amp;kcId=KB17969" xml:lang="en">http://www.blackberry.com/btsc/dynamickc.do?externalId=KB17969&amp;sliceID=1&amp;command=show&amp;forward=nonthreadedKC&amp;kcId=KB17969</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34573" xml:lang="en">34573</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022081" xml:lang="en">1022081</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1090" xml:lang="en">ADV-2009-1090</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the "Customize Statistics Page" (admin/statistics/ConfigureStatistics) in the MDS Connection Service in Research in Motion (RIM) BlackBerry Enterprise Server (BES) before 4.1.6 MR5 allows remote attackers to inject arbitrary web script or HTML via the (1) customDate, (2) interval, (3) lastCustomInterval, (4) lastIntervalLength, (5) nextCustomInterval, (6) nextIntervalLength, (7) action, (8) delIntervalIndex, (9) addStatIndex, (10) delStatIndex, and (11) referenceTime parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0310">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:10.3"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:opensuse:opensuse:10.3</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0310</vuln:cve-id>
    <vuln:published-datetime>2009-02-18T11:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:27:33.250-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" xml:lang="en">SUSE-SR:2009:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33794" xml:lang="en">33794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48797" xml:lang="en">suse-blinux-bo(48797)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in SUSE blinux (aka sbl) in SUSE openSUSE 10.3 through 11.0 has unknown impact and attack vectors related to "incoming data and authentication-strings."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0311">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:emc:autostart:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:emc:autostart:5.3:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:emc:autostart:5.3</vuln:product>
      <vuln:product>cpe:/a:emc:autostart:5.3:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0311</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T17:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:12.867-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500350/100/0/threaded" xml:lang="en">20090123 ZDI-09-009: EMC AutoStart Backbone Engine Trusted Pointer Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33415" xml:lang="en">33415</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021636" xml:lang="en">1021636</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://zerodayinitiative.com/advisories/ZDI-09-009/" xml:lang="en">http://zerodayinitiative.com/advisories/ZDI-09-009/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48197" xml:lang="en">autostart-backbone-code-execution(48197)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Backbone service (ftbackbone.exe) in EMC AutoStart before 5.3 SP2 allows remote attackers to execute arbitrary code via a packet with a crafted value that is dereferenced as a function pointer.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0312">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:moinmoin:moinmoin:1.8.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.7.0</vuln:product>
      <vuln:product>cpe:/a:moinmoin:moinmoin:1.8.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0312</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T20:30:03.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:15.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://hg.moinmo.in/moin/1.7/rev/89b91bf87dad" xml:lang="en">http://hg.moinmo.in/moin/1.7/rev/89b91bf87dad</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://hg.moinmo.in/moin/1.8/rev/89b91bf87dad" xml:lang="en">http://hg.moinmo.in/moin/1.8/rev/89b91bf87dad</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moinmo.in/SecurityFixes#moin1.8.1" xml:lang="en">http://moinmo.in/SecurityFixes#moin1.8.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/27/4" xml:lang="en">[oss-security] 20090127 CVE Request: MoinMoin</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48306" xml:lang="en">moinmoin-antispam-xss(48306)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/716-1/" xml:lang="en">USN-716-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="https://www.debian.org/security/2009/dsa-1715" xml:lang="en">DSA-1715</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the antispam feature (security/antispam.py) in MoinMoin 1.7 and 1.8.1 allows remote attackers to inject arbitrary web script or HTML via crafted, disallowed content.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0313">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:kegel:winetricks:20081127"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:kegel:winetricks:20081127</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0313</vuln:cve-id>
    <vuln:published-datetime>2009-01-27T21:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:53.080-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://code.google.com/p/winezeug/source/detail?r=253" xml:lang="en">http://code.google.com/p/winezeug/source/detail?r=253</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" xml:lang="en">SUSE-SR:2009:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33474" xml:lang="en">33474</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48320" xml:lang="en">winetricks-xshowmenu-symlink(48320)</vuln:reference>
    </vuln:references>
    <vuln:summary>winetricks before 20081223 allows local users to overwrite arbitrary files via a symlink attack on the x_showmenu.txt temporary file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0314">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gnome:gedit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gnome:gedit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0314</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T06:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:53.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugzilla.gnome.org/show_bug.cgi?id=569214" xml:lang="en">http://bugzilla.gnome.org/show_bug.cgi?id=569214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-41.xml" xml:lang="en">GLSA-200903-41</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:039" xml:lang="en">MDVSA-2009:039</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/26/2" xml:lang="en">[oss-security] 20090126 CVE request -- Python &lt; 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33445" xml:lang="en">33445</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481556" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481556</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48271" xml:lang="en">gedit-pysyssetargv-privilege-escalation(48271)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01195.html" xml:lang="en">FEDORA-2009-1189</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the Python module in gedit allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0315">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:xchat:xchat"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:xchat:xchat</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0315</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T06:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-06T01:49:28.233-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:059" xml:lang="en">MDVSA-2009:059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/26/2" xml:lang="en">[oss-security] 20090126 CVE request -- Python &lt; 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33444" xml:lang="en">33444</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481560" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481560</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the Python module in xchat allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0316">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vim:vim:7.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vim:vim:1.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:1.22</vuln:product>
      <vuln:product>cpe:/a:vim:vim:3.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:4.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.1</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.2</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.3</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.4</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.5</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.6</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.7</vuln:product>
      <vuln:product>cpe:/a:vim:vim:5.8</vuln:product>
      <vuln:product>cpe:/a:vim:vim:6.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:6.1</vuln:product>
      <vuln:product>cpe:/a:vim:vim:6.2</vuln:product>
      <vuln:product>cpe:/a:vim:vim:6.3</vuln:product>
      <vuln:product>cpe:/a:vim:vim:6.4</vuln:product>
      <vuln:product>cpe:/a:vim:vim:7.0</vuln:product>
      <vuln:product>cpe:/a:vim:vim:7.1</vuln:product>
      <vuln:product>cpe:/a:vim:vim:7.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0316</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T06:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:53.187-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493937" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=493937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:047" xml:lang="en">MDVSA-2009:047</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.nabble.com/Bug-484305%3A-bicyclerepair%3A-bike.vim-imports-untrusted-python-files-from-cwd-td18848099.html" xml:lang="en">[debian-bugs-rc] 20080805 Bug#484305: bicyclerepair: bike.vim imports untrusted python files from cwd</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/26/2" xml:lang="en">[oss-security] 20090126 CVE request -- Python &lt; 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33447" xml:lang="en">33447</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481565" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48275" xml:lang="en">vim-pysyssetargv-privilege-escalation(48275)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://svn.pardus.org.tr/pardus/2008/applications/editors/vim/files/official/7.2.045" xml:lang="en">https://svn.pardus.org.tr/pardus/2008/applications/editors/vim/files/official/7.2.045</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0317">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gnome:nautilus-python"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gnome:nautilus-python</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0317</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T06:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-05T01:53:34.717-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/26/2" xml:lang="en">[oss-security] 20090126 CVE request -- Python &lt; 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33442" xml:lang="en">33442</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481570" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481570</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the Python language bindings for Nautilus (nautilus-python) allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0318">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gnome:gnumeric"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gnome:gnumeric</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0318</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T06:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-16T01:37:06.640-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.gnome.org/show_bug.cgi?id=569648" xml:lang="en">http://bugzilla.gnome.org/show_bug.cgi?id=569648</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-03.xml" xml:lang="en">GLSA-200904-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:043" xml:lang="en">MDVSA-2009:043</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/26/2" xml:lang="en">[oss-security] 20090126 CVE request -- Python &lt; 2.6 PySys_SetArgv issues (epiphany, csound, dia, eog, gedit, xchat, vim, nautilus-python, Gnumeric)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33438" xml:lang="en">33438</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481572" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481572</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00211.html" xml:lang="en">FEDORA-2009-1295</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in the GObject Python interpreter wrapper in Gnumeric allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0319">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0319</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T13:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5977" name="oval:org.mitre.oval:def:5977"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-128624-09-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-128624-09-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-249966-1" xml:lang="en">249966</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-041.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-041.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33459" xml:lang="en">33459</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021644" xml:lang="en">1021644</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0256" xml:lang="en">ADV-2009-0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0363" xml:lang="en">ADV-2009-0363</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48234" xml:lang="en">solaris-autofs-code-execution(48234)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the autofs module in the kernel in Sun Solaris 8 through 10, and OpenSolaris before snv_108, allows local users to cause a denial of service (autofs mount outage) or possibly gain privileges via vectors related to "xdr processing problems."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0320">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0320</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T13:30:00.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:13.443-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:cwe id="CWE-362"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500393/100/0/threaded" xml:lang="en">20090124 Benchmarking attacks and major security weakness on all recent Windows versions up to Windows 200</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33440" xml:lang="en">33440</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Windows XP, Server 2003 and 2008, and Vista exposes I/O activity measurements of all processes, which allows local users to obtain sensitive information, as demonstrated by reading the I/O Other Bytes column in Task Manager (aka taskmgr.exe) to estimate the number of characters that a different user entered at a runas.exe password prompt, related to a "benchmarking attack."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0321">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:safari:3.2.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:3.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0321</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T13:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6091" name="oval:org.mitre.oval:def:6091"/>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lostmon.blogspot.com/2009/01/safari-for-windows-321-remote-http-uri.html" xml:lang="en">http://lostmon.blogspot.com/2009/01/safari-for-windows-321-remote-http-uri.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33481" xml:lang="en">33481</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48284" xml:lang="en">safari-httpuri-dos(48284)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Safari 3.2.1 (aka AppVer 3.525.27.1) on Windows allows remote attackers to cause a denial of service (infinite loop or access violation) via a link to an http URI in which the authority (aka hostname) portion is either a (1) . (dot) or (2) .. (dot dot) sequence.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0322">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:-"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.0.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.63"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.65"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.66"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.67"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.68"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.69"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.70"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.71"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.72"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.73"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.74"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.75"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.76"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.77"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.78"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.79"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.80"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.81"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.82"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.83"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.84"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.85"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.86"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.87"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.88"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.89"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.90"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.91"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.92"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.93"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.94"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.95"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.96"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.97"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.98"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.99"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.100"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.101"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.102"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.103"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.104"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.105"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.106"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.107"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.108"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.109"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.110"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.111"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.112"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.113"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.114"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.115"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.116"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.117"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.118"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.119"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.120"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.121"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.122"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.123"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.124"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.125"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.126"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.127"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.128"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.129"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.130"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.131"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.1.132"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.13:pre15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.15:pre16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.16:pre5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.16:pre6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.17:pre14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.21:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.22:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.3.99:pre9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.0:test9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.3:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.11:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.18:pre9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.19:pre6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.21:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.21:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.21:pre7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.22:pre10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.23:pre9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27:pre3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27:pre4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.27:pre5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.29:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.29:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.30:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.30:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.31:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.32:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.32:pre2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33:pre1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.33.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.34:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.34.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.34.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.35.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.63"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.65"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.66"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.67"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.68"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.69"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.5.75"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:final"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:debian:debian_linux:5.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:canonical:ubuntu_linux:7.10"/>
        <cpe-lang:fact-ref name="cpe:/o:canonical:ubuntu_linux:8.04::~~lts~~~"/>
        <cpe-lang:fact-ref name="cpe:/o:canonical:ubuntu_linux:8.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:canonical:ubuntu_linux:7.10</vuln:product>
      <vuln:product>cpe:/o:canonical:ubuntu_linux:8.04::~~lts~~~</vuln:product>
      <vuln:product>cpe:/o:canonical:ubuntu_linux:8.10</vuln:product>
      <vuln:product>cpe:/o:debian:debian_linux:4.0</vuln:product>
      <vuln:product>cpe:/o:debian:debian_linux:5.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:-</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:1.2.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:1.3.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.0.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.63</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.65</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.66</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.67</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.68</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.69</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.70</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.71</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.72</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.73</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.74</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.75</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.76</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.77</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.78</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.79</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.80</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.81</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.82</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.83</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.84</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.85</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.86</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.87</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.88</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.89</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.90</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.91</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.92</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.93</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.94</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.95</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.96</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.97</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.98</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.99</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.100</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.101</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.102</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.103</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.104</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.105</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.106</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.107</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.108</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.109</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.110</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.111</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.112</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.113</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.114</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.115</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.116</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.117</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.118</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.119</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.120</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.121</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.122</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.123</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.124</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.125</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.126</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.127</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.128</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.129</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.130</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.131</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.1.132</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.4:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.13:pre15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.15:pre16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.16:pre5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.16:pre6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.17:pre14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.21:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.22:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.22:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.22:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.3.99:pre9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.0:test9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.3:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.11:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.18:pre9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.19:pre6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.21:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.21:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.21:pre7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.22:pre10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.23:pre9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27:pre3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27:pre4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.27:pre5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.29:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.29:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.30:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.30:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.31:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.32:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.32:pre2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33:pre1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.33.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.34:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.34.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.34.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.35.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.63</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.65</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.66</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.67</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.68</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.69</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.5.75</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:final</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0322</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T13:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-08T15:20:26.613-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2018-11-07T10:04:41.093-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10163" name="oval:org.mitre.oval:def:10163"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7734" name="oval:org.mitre.oval:def:7734"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=81156928f8fe31621e467490b9d441c0285998c3" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=81156928f8fe31621e467490b9d441c0285998c3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.13" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.13</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.2" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html" xml:lang="en">SUSE-SA:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-114.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0331.html" xml:lang="en">RHSA-2009:0331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0360.html" xml:lang="en">RHSA-2009:0360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33428" xml:lang="en">33428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:summary>drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0323">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:0.95b"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.0a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.1c"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.3a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:1.4a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:4.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.1b"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:8.52"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.52"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.53"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.54"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:9.55"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:w3:amaya:11.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:w3:amaya:0.9</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:0.95b</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.0a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.1a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.1c</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.2a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.3a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.3b</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:1.4a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:2.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:2.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:2.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:2.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:2.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:3.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:3.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:3.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:3.2.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.2.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.3.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:4.3.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:5.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:5.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:5.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:5.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:6.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:6.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:6.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:6.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:6.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:7.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:7.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:7.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.1a</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.1b</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.5</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.6</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.7</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.7.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.7.2</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.8.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.8.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.8.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.8.5</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:8.52</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.2.1</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.3</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.4</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.5</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.52</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.53</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.54</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:9.55</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:10.0</vuln:product>
      <vuln:product>cpe:/a:w3:amaya:11.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0323</vuln:cve-id>
    <vuln:published-datetime>2009-01-28T15:30:03.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:21.350-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/amaya-buffer-overflows" xml:lang="en">http://www.coresecurity.com/content/amaya-buffer-overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500492/100/0/threaded" xml:lang="en">20090128 CORE-2008-1211: Amaya web editor XML and HTML parser vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48325" xml:lang="en">amaya-html-tags-bo(48325)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7902" xml:lang="en">7902</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable.  NOTE: these are different vectors than CVE-2008-6005.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0324">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bibciter:bibciter:1.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bibciter:bibciter:1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0324</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bibciter.sourceforge.net/?p=35" xml:lang="en">http://bibciter.sourceforge.net/?p=35</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33329" xml:lang="en">33329</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48080" xml:lang="en">bibciter-projects-sql-injection(48080)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7814" xml:lang="en">7814</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in BibCiter 1.4 allow remote attackers to execute arbitrary SQL commands via the (1) idp parameter to reports/projects.php, the (2) idc parameter to reports/contacts.php, and the (3) idu parameter to reports/users.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0325">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ninjadesigns:ninja_blog:4.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ninjadesigns:ninja_blog:4.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0325</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.827-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.push55.co.uk/index.php?s=ad&amp;id=6" xml:lang="en">http://www.push55.co.uk/index.php?s=ad&amp;id=6</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33351" xml:lang="en">33351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7831" xml:lang="en">7831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://www.push55.co.uk/poclibrary/ninjadesignscouk-1.txt" xml:lang="en">https://www.push55.co.uk/poclibrary/ninjadesignscouk-1.txt</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in entries/index.php in Ninja Blog 4.8, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the cat parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0326">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dark_age_cms:dark_age_cms:0.2c:beta"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dark_age_cms:dark_age_cms:0.2c:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0326</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:53.533-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33271" xml:lang="en">33271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48095" xml:lang="en">darkagecms-login-sql-injection(48095)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in Dark Age CMS 0.2c beta allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0327">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:seraphimtech:free_bible_search_php_script:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:seraphimtech:free_bible_search_php_script:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0327</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.887-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://freshmeat.net/projects/freebiblesearch/?branch_id=77256&amp;release_id=292446" xml:lang="en">http://freshmeat.net/projects/freebiblesearch/?branch_id=77256&amp;release_id=292446</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33301" xml:lang="en">33301</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.seraphimtech.net/repository/Changes.txt" xml:lang="en">http://www.seraphimtech.net/repository/Changes.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7798" xml:lang="en">7798</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in readbible.php in Free Bible Search PHP Script 1.0 allows remote attackers to execute arbitrary SQL commands via the version parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0328">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:robs-projects:digital_sales_ipn:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:robs-projects:digital_sales_ipn:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0328</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.933-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48082" xml:lang="en">digitalsales-sales-information-disclosure(48082)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7816" xml:lang="en">7816</vuln:reference>
    </vuln:references>
    <vuln:summary>ROBS-PROJECTS Digital Sales IPN (aka DS-IPN.NET or DS-IPN Paypal Shop) stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request for Database/Sales.mdb.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0329">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_pccookbook"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_pccookbook</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0329</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:44.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33346" xml:lang="en">33346</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48088" xml:lang="en">pccookbook-recipeid-sql-injection(48088)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7824" xml:lang="en">7824</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the PcCookBook (com_pccookbook) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the recipe_id parameter in a viewrecipe action to index.php, a different vector than CVE-2008-0844.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0330">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wss-pro:scms:1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wss-pro:scms:1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0330</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33330" xml:lang="en">33330</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48081" xml:lang="en">scms-index-file-include(48081)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7818" xml:lang="en">7818</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in index.php in Simple Content Management System (SCMS) 1 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the p parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0331">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:quirm:espg:1.72"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:quirm:espg:1.72</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0331</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.107-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33335" xml:lang="en">33335</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48087" xml:lang="en">espg-comment-directory-traversal(48087)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7819" xml:lang="en">7819</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in gallery/comment.php in Enhanced Simple PHP Gallery (ESPG) 1.72 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.  NOTE: the vulnerability may be in my little homepage Comment script. If so, then this should not be treated as a vulnerability in ESPG.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0332">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:avbooklibrary:avbooklibrary:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:avbooklibrary:avbooklibrary:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:avbooklibrary:avbooklibrary:1.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:avbooklibrary:avbooklibrary:1.0.0</vuln:product>
      <vuln:product>cpe:/a:avbooklibrary:avbooklibrary:1.0.1</vuln:product>
      <vuln:product>cpe:/a:avbooklibrary:avbooklibrary:1.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0332</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:53.783-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=654214" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=654214</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2219743&amp;group_id=209711&amp;atid=1010816" xml:lang="en">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2219743&amp;group_id=209711&amp;atid=1010816</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48084" xml:lang="en">avbook-edit-sql-injection(48084)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in AV Book Library before 1.1 allow remote attackers to execute arbitrary SQL commands via unspecified parameters to (1) admin/edit.php, (2) admin/add.php, (3) lib/book_search.php, and possibly other components.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0333">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_waticketsystem"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_waticketsystem</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0333</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.223-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33353" xml:lang="en">33353</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7833" xml:lang="en">7833</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the WebAmoeba (WA) Ticket System (com_waticketsystem) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in a category action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0334">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:blogit%21:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:blogit%21:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0334</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.593-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.167-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33325" xml:lang="en">33325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48074" xml:lang="en">blogit-index-sql-injection(48074)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7806" xml:lang="en">7806</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the day parameter in an archive action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0335">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:blogit%21:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:blogit%21:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0335</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33325" xml:lang="en">33325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48073" xml:lang="en">blogit-index-xss(48073)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7806" xml:lang="en">7806</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to inject arbitrary web script or HTML via the view parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0336">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:blogit%21:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:blogit%21:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0336</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48075" xml:lang="en">blogit-blog-information-disclosure(48075)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7806" xml:lang="en">7806</vuln:reference>
    </vuln:references>
    <vuln:summary>Katy Whitton BlogIt! stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request for database/Blog.mdb.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0337">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:katywhitton:blogit%21:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:katywhitton:blogit%21:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0337</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.340-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7806" xml:lang="en">7806</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0338">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:blog_manager:_nil"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:blog_manager:_nil</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0338</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.670-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:21.883-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500146/100/0/threaded" xml:lang="en">20090116 DMXReady Blog Manager (SQL/XSS)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33314" xml:lang="en">33314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48053" xml:lang="en">blogmanager-incwebblogmanager-xss(48053)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in inc_webblogmanager.asp in DMXReady Blog Manager allows remote attackers to inject arbitrary web script or HTML via the CategoryID parameter in a refer action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0339">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:blog_manager:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:blog_manager:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0339</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.703-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:22.320-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500146/100/0/threaded" xml:lang="en">20090116 DMXReady Blog Manager (SQL/XSS)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33314" xml:lang="en">33314</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48054" xml:lang="en">blogmanager-incwebblogmanager-sql-injection(48054)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in inc_webblogmanager.asp in DMXReady Blog Manager allows remote attackers to execute arbitrary SQL commands via the itemID parameter in a view action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0340">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:quirm:simple_php_newsletter:1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:quirm:simple_php_newsletter:1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0340</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T13:30:02.717-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33327" xml:lang="en">33327</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48089" xml:lang="en">simplephpnewsletter-mail-file-include(48089)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7813" xml:lang="en">7813</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple directory traversal vulnerabilities in Simple PHP Newsletter 1.5 allow remote attackers to read arbitrary files via a .. (dot dot) in the olang parameter to (1) mail.php and (2) mailbar.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0341">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0341</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:23.197-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500472/100/0/threaded" xml:lang="en">20090128 Internet explorer 7.0 stack overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33494" xml:lang="en">33494</vuln:reference>
    </vuln:references>
    <vuln:summary>The shell32 module in Microsoft Internet Explorer 7.0 on Windows XP SP3 might allow remote attackers to execute arbitrary code via a long VALUE attribute in an INPUT element, possibly related to a stack consumption vulnerability.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0342">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6a"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6b"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6c"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6d"/>
          <cpe-lang:fact-ref name="cpe:/a:provos:systrace:1.6e"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:_nil_:_nil_:x86_64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:provos:systrace:1.1</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.2</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.3</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.4</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.5</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6a</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6b</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6c</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6d</vuln:product>
      <vuln:product>cpe:/a:provos:systrace:1.6e</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0342</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:23.413-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-001.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.citi.umich.edu/u/provos/systrace/" xml:lang="en">http://www.citi.umich.edu/u/provos/systrace/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500377/100/0/threaded" xml:lang="en">20090123 Problems with syscall filtering technologies on Linux</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33417" xml:lang="en">33417</vuln:reference>
    </vuln:references>
    <vuln:summary>Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0343">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.4"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6a"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6b"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6c"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6d"/>
          <cpe-lang:fact-ref name="cpe:/a:niels_provos:systrace:1.6e"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:_nil_:_nil_:x86_64"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:niels_provos:systrace:1.1</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.2</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.3</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.4</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.5</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6a</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6b</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6c</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6d</vuln:product>
      <vuln:product>cpe:/a:niels_provos:systrace:1.6e</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0343</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:23.850-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-001.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/01/bypassing-syscall-filtering.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.citi.umich.edu/u/provos/systrace/" xml:lang="en">http://www.citi.umich.edu/u/provos/systrace/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500377/100/0/threaded" xml:lang="en">20090123 Problems with syscall filtering technologies on Linux</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33417" xml:lang="en">33417</vuln:reference>
    </vuln:references>
    <vuln:summary>Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0344">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:sun:fire_x2100_m2:3.19:-:x86"/>
        <cpe-lang:fact-ref name="cpe:/h:sun:fire_x2200_m2:2.19:-:x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:sun:fire_x2100_m2:3.19:-:x86</vuln:product>
      <vuln:product>cpe:/h:sun:fire_x2200_m2:2.19:-:x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0344</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:49.950-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-239886-1" xml:lang="en">239886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33506" xml:lang="en">33506</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021646" xml:lang="en">1021646</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0281" xml:lang="en">ADV-2009-0281</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48329" xml:lang="en">sunfire-elom-unauth-access(48329)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Embedded Lights Out Manager (ELOM) on the Sun Fire X2100 M2 and X2200 M2 x86 platforms before SP/BMC firmware 3.20 allows remote attackers to obtain privileged ELOM login access or execute arbitrary Service Processor (SP) commands via unknown vectors, aka Bug ID 6633175, a different vulnerability than CVE-2007-5717.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0345">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:sun:fire_x2100_m2:3.19:-:x86"/>
        <cpe-lang:fact-ref name="cpe:/h:sun:fire_x2200_m2:2.19:-:x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:sun:fire_x2100_m2:3.19:-:x86</vuln:product>
      <vuln:product>cpe:/h:sun:fire_x2200_m2:2.19:-:x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0345</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:49.950-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-239886-1" xml:lang="en">239886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33506" xml:lang="en">33506</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021646" xml:lang="en">1021646</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0281" xml:lang="en">ADV-2009-0281</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48329" xml:lang="en">sunfire-elom-unauth-access(48329)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Embedded Lights Out Manager (ELOM) on the Sun Fire X2100 M2 and X2200 M2 x86 platforms before SP/BMC firmware 3.20 allows remote attackers to obtain privileged ELOM login access or execute arbitrary Service Processor (SP) commands via unknown vectors, aka Bug ID 6648082, a different vulnerability than CVE-2007-5717.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0346">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0346</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.467-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6088" name="oval:org.mitre.oval:def:6088"/>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-114344-38-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-114344-38-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-240086-1" xml:lang="en">240086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-043.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-043.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33504" xml:lang="en">33504</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0365" xml:lang="en">ADV-2009-0365</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48328" xml:lang="en">solaris-ipinip-dos(48328)</vuln:reference>
    </vuln:references>
    <vuln:summary>The IP-in-IP packet processing implementation in the IPsec and IP stacks in the kernel in Sun Solaris 9 and 10, and OpenSolaris snv_01 though snv_85, allows local users to cause a denial of service (panic) via a self-encapsulated packet that lacks IPsec protection.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0347">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:autonomy:ultraseek:_nil_"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:autonomy:ultraseek:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0347</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:54.330-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html" xml:lang="en">http://sunbeltblog.blogspot.com/2009/01/constant-stream-of-ultraseek-redirects.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/202753" xml:lang="en">VU#202753</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33500" xml:lang="en">33500</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ultraseek.com/forums/thread.jspa?messageID=9818" xml:lang="en">http://www.ultraseek.com/forums/thread.jspa?messageID=9818</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48336" xml:lang="en">ultraseek-cs-phishing(48336)</vuln:reference>
    </vuln:references>
    <vuln:summary>Open redirect vulnerability in cs.html in the Autonomy (formerly Verity) Ultraseek search engine allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the url parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0348">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_10_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_10_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_10_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_10_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_8_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_8_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_8_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_8_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_9_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_9_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_9_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7.1::solaris_9_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_x86"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_linux"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_sparc"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_windows"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_10_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_8_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:6.3_2005q1::solaris_9_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_10_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_10_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_10_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_10_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_8_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_8_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_8_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_8_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_9_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_9_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_9_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7.1::solaris_9_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_10_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_8_x86</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_linux</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_sparc</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_windows</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_access_manager:7_2005q4::solaris_9_x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0348</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:54.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-119465-15-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-119465-15-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-242026-1" xml:lang="en">242026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33489" xml:lang="en">33489</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0269" xml:lang="en">ADV-2009-0269</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48283" xml:lang="en">sun-jsam-username-info-disclosure(48283)</vuln:reference>
    </vuln:references>
    <vuln:summary>The login module in Sun Java System Access Manager 6 2005Q1 (aka 6.3), 7 2005Q4 (aka 7.0), and 7.1 responds differently to a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0349">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ftpshell:ftpshell_server:4.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ftpshell:ftpshell_server:4.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0349</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7852" xml:lang="en">7852</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in FTPShell Server 4.3 allows user-assisted remote attackers to cause a denial of service (persistent daemon crash) and possibly execute arbitrary code via a long string in a licensing key (aka .key) file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0350">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:merak:media_player:3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:merak:media_player:3.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0350</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7857" xml:lang="en">7857</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Merak Media Player 3.2 allows remote attackers to execute arbitrary code via a long string in a .m3u playlist file, related to the status bar icon's tooltip.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0351">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wftpserver:winftp_ftp_server:2.3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wftpserver:winftp_ftp_server:2.3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0351</vuln:cve-id>
    <vuln:published-datetime>2009-01-29T14:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33454" xml:lang="en">33454</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0254" xml:lang="en">ADV-2009-0254</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48263" xml:lang="en">winftp-list-bo(48263)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7875" xml:lang="en">7875</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in WFTPSRV.exe in WinFTP 2.3.0 allows remote authenticated users to execute arbitrary code via a long LIST argument beginning with an * (asterisk) character.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0352">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0352</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:16.050-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10699" name="oval:org.mitre.oval:def:10699"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-01.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0257.html" xml:lang="en">RHSA-2009:0257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021663" xml:lang="en">1021663</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=331088" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=331088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=401042" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=401042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=416461" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=416461</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=420697" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=420697</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=421839" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=421839</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=422283" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=422283</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=422301" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=422301</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=431705" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=431705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=437142" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=437142</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=449006" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=449006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=461027" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=461027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/741-1/" xml:lang="en">USN-741-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and destruction of arbitrary layout objects by the nsViewManager::Composite function.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0353">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.5:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.5:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0353</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.857-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11193" name="oval:org.mitre.oval:def:11193"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-01.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0257.html" xml:lang="en">RHSA-2009:0257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021663" xml:lang="en">1021663</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=452913" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=452913</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Mozilla Firefox 3.x before 3.0.6, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0354">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0354</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:45.917-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9796" name="oval:org.mitre.oval:def:9796"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-02.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021664" xml:lang="en">1021664</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=468581" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=468581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-domain vulnerability in js/src/jsobj.cpp in Mozilla Firefox 3.x before 3.0.6 allows remote attackers to bypass the Same Origin Policy, and access the properties of an arbitrary window and conduct cross-site scripting (XSS) attacks, via vectors involving a chrome XBL method and the window.eval function.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0355">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9_rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9:rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9_rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0355</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.013-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9161" name="oval:org.mitre.oval:def:9161"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-03.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-03.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0257.html" xml:lang="en">RHSA-2009:0257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021665" xml:lang="en">1021665</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-2" xml:lang="en">USN-717-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=466937" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=466937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:summary>components/sessionstore/src/nsSessionStore.js in Mozilla Firefox before 3.0.6 does not block changes of INPUT elements to type="file" during tab restoration, which allows user-assisted remote attackers to read arbitrary files on a client machine via a crafted INPUT element.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0356">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9_rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9:rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9_rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0356</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.107-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9922" name="oval:org.mitre.oval:def:9922"/>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-04.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021666" xml:lang="en">1021666</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=460425" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=460425</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.0.6 and SeaMonkey do not block links to the (1) about:plugins and (2) about:config URIs from .desktop files, which allows user-assisted remote attackers to bypass the Same Origin Policy and execute arbitrary code with chrome privileges via vectors involving the URL field in a Desktop Entry section of a .desktop file, related to representation of about: URIs as jar:file:// URIs.  NOTE: this issue exists because of an incomplete fix for CVE-2008-4582.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0357">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0357</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.183-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9459" name="oval:org.mitre.oval:def:9459"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ha.ckers.org/blog/20070511/bluehat-errata/" xml:lang="en">http://ha.ckers.org/blog/20070511/bluehat-errata/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-05.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-05.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0257.html" xml:lang="en">RHSA-2009:0257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021668" xml:lang="en">1021668</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-2" xml:lang="en">USN-717-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=380418" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=380418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.0.6 and SeaMonkey before 1.1.15 do not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0358">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0:beta5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0358</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.3</cvss:score>
        <cvss:access-vector>ADJACENT_NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10610" name="oval:org.mitre.oval:def:10610"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blogs.imeta.co.uk/JDeabill/archive/2008/07/14/303.aspx" xml:lang="en">http://blogs.imeta.co.uk/JDeabill/archive/2008/07/14/303.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00001.html" xml:lang="en">SUSE-SA:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0256.html" xml:lang="en">RHSA-2009:0256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-040.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:044" xml:lang="en">MDVSA-2009:044</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-06.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-06.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33598" xml:lang="en">33598</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021667" xml:lang="en">1021667</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-717-1" xml:lang="en">USN-717-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0313" xml:lang="en">ADV-2009-0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=441751" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=441751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00240.html" xml:lang="en">FEDORA-2009-1399</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox 3.x before 3.0.6 does not properly implement the (1) no-store and (2) no-cache Cache-Control directives, which allows local users to obtain sensitive information by using the (a) back button or (b) history list of the victim's browser, as demonstrated by reading the response page of an https POST request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0359">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:nongnu:samizdat:0.6.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:nongnu:samizdat:0.6.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0359</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:24.290-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch" xml:lang="en">http://samizdat.nongnu.org/release-notes/samizdat-0.6.1-xss-escape-title.patch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/debian-testing-security-announce@lists.debian.org/msg00171.html" xml:lang="en">[debian-testing-security-announce] 20090211 Security update for Debian Testing - 2009-02-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html" xml:lang="en">http://www.nongnu.org/samizdat/release-notes/samizdat-0.6.2.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500961/100/0/threaded" xml:lang="en">20090213 Cross-site scripting in Samizdat 0.6.1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33768" xml:lang="en">33768</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Samizdat before 0.6.2 allow remote authenticated users to inject arbitrary web script or HTML via the (1) message title or (2) user full name.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0360">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.12"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.0</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.1</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.2</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.3</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.4</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.5</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:2.6</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.0</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.1</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.2</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.3</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.4</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.5</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.6</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.7</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.8</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.9</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.10</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.11</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0360</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:24.757-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669" name="oval:org.mitre.oval:def:5669"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732" name="oval:org.mitre.oval:def:5732"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-39.xml" xml:lang="en">GLSA-200903-39</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021711" xml:lang="en">1021711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1" xml:lang="en">252767</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1721" xml:lang="en">DSA-1721</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html" xml:lang="en">http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500892/100/0/threaded" xml:lang="en">20090211 pam-krb5 security advisory (3.12 and earlier)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33740" xml:lang="en">33740</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-719-1" xml:lang="en">USN-719-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0410" xml:lang="en">ADV-2009-0410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0426" xml:lang="en">ADV-2009-0426</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0979" xml:lang="en">ADV-2009-0979</vuln:reference>
    </vuln:references>
    <vuln:summary>Russ Allbery pam-krb5 before 3.13, when linked against MIT Kerberos, does not properly initialize the Kerberos libraries for setuid use, which allows local users to gain privileges by pointing an environment variable to a modified Kerberos configuration file, and then launching a PAM-based setuid application.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0361">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:eyrie:pam-krb5:3.12"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.0</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.1</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.2</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.3</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.4</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.5</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.6</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.7</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.8</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.9</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.10</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.11</vuln:product>
      <vuln:product>cpe:/a:eyrie:pam-krb5:3.12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0361</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:26.663-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403" name="oval:org.mitre.oval:def:5403"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521" name="oval:org.mitre.oval:def:5521"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-39.xml" xml:lang="en">GLSA-200903-39</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021711" xml:lang="en">1021711</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1" xml:lang="en">252767</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1721" xml:lang="en">DSA-1721</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1722" xml:lang="en">DSA-1722</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html" xml:lang="en">http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500892/100/0/threaded" xml:lang="en">20090211 pam-krb5 security advisory (3.12 and earlier)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33741" xml:lang="en">33741</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-719-1" xml:lang="en">USN-719-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0410" xml:lang="en">ADV-2009-0410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0426" xml:lang="en">ADV-2009-0426</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0979" xml:lang="en">ADV-2009-0979</vuln:reference>
    </vuln:references>
    <vuln:summary>Russ Allbery pam-krb5 before 3.13, as used by libpam-heimdal, su in Solaris 10, and other software, does not properly handle calls to pam_setcred when running setuid, which allows local users to overwrite and change the ownership of arbitrary files by setting the KRB5CCNAME environment variable, and then launching a setuid application that performs certain pam_setcred operations.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0362">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fail2ban:fail2ban:0.8.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fail2ban:fail2ban:0.8.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0362</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T20:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-13T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-13T12:23:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514163" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514163</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33734" xml:lang="en">33734</vuln:reference>
    </vuln:references>
    <vuln:summary>filter.d/wuftpd.conf in Fail2ban 0.8.3 uses an incorrect regular expression that allows remote attackers to cause a denial of service (forced authentication failures) via a crafted reverse-resolved DNS name (rhost) entry that contains a substring that is interpreted as an IP address, a different vulnerability than CVE-2007-4321.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0363">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:barnowl:barnowl:1.0.4.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ktools:owl:2.1.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.0</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.1</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.2</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.2.1</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.3</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.4</vuln:product>
      <vuln:product>cpe:/a:barnowl:barnowl:1.0.4.1</vuln:product>
      <vuln:product>cpe:/a:ktools:owl:2.1.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0363</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:54.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_USER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://barnowl.mit.edu/browser/ChangeLog" xml:lang="en">http://barnowl.mit.edu/browser/ChangeLog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://barnowl.mit.edu/wiki/barnowl-1.0.5-announce" xml:lang="en">http://barnowl.mit.edu/wiki/barnowl-1.0.5-announce</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/515118" xml:lang="en">http://bugs.debian.org/515118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.mail-archive.com/debian-testing-security-announce@lists.debian.org/msg00173.html" xml:lang="en">[debian-testing-security-announce] 20090213 Security update for Debian Testing - 2009-02-14</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.launchpad.net/ubuntu/+source/owl/+bug/329165" xml:lang="en">https://bugs.launchpad.net/ubuntu/+source/owl/+bug/329165</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48824" xml:lang="en">barnowl-owl-zcrypt-bo(48824)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in (a) BarnOwl before 1.0.5 and (b) owl 2.1.11 allow remote attackers to execute arbitrary code via vectors involving (1) a crafted zcrypt message, related to zcrypt.c; (2) a reply command on a message with a Zephyr Cc: list, related to zwrite.c; and unspecified other use of the products.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0364">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.02"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.10"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.11"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.12"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.22"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.37"/>
        <cpe-lang:fact-ref name="cpe:/a:citadel:webcit:7.38"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:citadel:webcit:7.02</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.10</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.11</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.12</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.22</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.37</vuln:product>
      <vuln:product>cpe:/a:citadel:webcit:7.38</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0364</vuln:cve-id>
    <vuln:published-datetime>2009-03-26T01:50:27.517-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-02T01:44:23.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.citadel.org/doku.php/news:webcit.security.advisory.-.2009-march-23" xml:lang="en">http://www.citadel.org/doku.php/news:webcit.security.advisory.-.2009-march-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1752" xml:lang="en">DSA-1752</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34206" xml:lang="en">34206</vuln:reference>
    </vuln:references>
    <vuln:summary>Format string vulnerability in the mini_calendar component in Citadel.org WebCit 7.22, and other versions before 7.39, allows remote attackers to execute arbitrary code via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0365">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:ubuntu:ubuntu_linux:6.06:-:lts"/>
        <cpe-lang:fact-ref name="cpe:/o:ubuntu:ubuntu_linux:7.10"/>
        <cpe-lang:fact-ref name="cpe:/o:ubuntu:ubuntu_linux:8.04:-:lts"/>
        <cpe-lang:fact-ref name="cpe:/o:ubuntu:ubuntu_linux:8.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:ubuntu:ubuntu_linux:6.06:-:lts</vuln:product>
      <vuln:product>cpe:/o:ubuntu:ubuntu_linux:7.10</vuln:product>
      <vuln:product>cpe:/o:ubuntu:ubuntu_linux:8.04:-:lts</vuln:product>
      <vuln:product>cpe:/o:ubuntu:ubuntu_linux:8.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0365</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10828" name="oval:org.mitre.oval:def:10828"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html" xml:lang="en">SUSE-SA:2009:013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021910" xml:lang="en">1021910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021911" xml:lang="en">1021911</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&amp;r2=1207&amp;pathrev=1207" xml:lang="en">http://svn.gnome.org/viewvc/network-manager-applet/trunk/nm-applet.conf?r1=1133&amp;r2=1207&amp;pathrev=1207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.gnome.org/viewvc/network-manager-applet?view=revision&amp;revision=1207" xml:lang="en">http://svn.gnome.org/viewvc/network-manager-applet?view=revision&amp;revision=1207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1955" xml:lang="en">DSA-1955</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0361.html" xml:lang="en">RHSA-2009:0361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0362.html" xml:lang="en">RHSA-2009:0362</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33966" xml:lang="en">33966</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021908" xml:lang="en">1021908</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-727-1" xml:lang="en">USN-727-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-727-2" xml:lang="en">USN-727-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487722" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487722</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487752" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487752</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49062" xml:lang="en">networkmanager-dbus-info-disclosure(49062)</vuln:reference>
    </vuln:references>
    <vuln:summary>nm-applet.conf in GNOME NetworkManager before 0.7.0.99 contains an incorrect deny setting, which allows local users to discover (1) network connection passwords and (2) pre-shared keys via calls to the GetSecrets method in the dbus request handler.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0366">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.0:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.12"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.13"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.14"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.15"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.16"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.17"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.18"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.3.19"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.0:rc</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.8</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.9</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.10</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.11</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.12</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.13</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.1.14</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.2.8</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.8</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.9</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.10</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.11</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.12</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.13</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.14</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.15</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.16</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.17</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.18</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.3.19</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.0</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.8</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.9</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.10</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0366</vuln:cve-id>
    <vuln:published-datetime>2009-03-12T11:20:49.717-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:54:15.517-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/335089" xml:lang="en">http://launchpad.net/bugs/335089</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/336396" xml:lang="en">http://launchpad.net/bugs/336396</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/cve/2009-0366" xml:lang="en">http://launchpad.net/bugs/cve/2009-0366</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069&amp;r1=32990&amp;r2=33069" xml:lang="en">http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069&amp;r1=32990&amp;r2=33069</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069&amp;view=log" xml:lang="en">http://svn.gna.org/viewcvs/wesnoth/trunk/src/server/simple_wml.cpp?rev=33069&amp;view=log</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1737" xml:lang="en">DSA-1737</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34085" xml:lang="en">34085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://gna.org/bugs/index.php?13037" xml:lang="en">https://gna.org/bugs/index.php?13037</vuln:reference>
    </vuln:references>
    <vuln:summary>The uncompress_buffer function in src/server/simple_wml.cpp in Wesnoth before r33069 allows remote attackers to cause a denial of service via a large compressed WML document.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0367">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:wesnoth:wesnoth:1.5.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.4.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.0</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.1</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.2</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.3</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.4</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.5</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.6</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.7</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.8</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.9</vuln:product>
      <vuln:product>cpe:/a:wesnoth:wesnoth:1.5.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0367</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:54.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/335089" xml:lang="en">http://launchpad.net/bugs/335089</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/336396" xml:lang="en">http://launchpad.net/bugs/336396</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://launchpad.net/bugs/cve/2009-0367" xml:lang="en">http://launchpad.net/bugs/cve/2009-0367</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog" xml:lang="en">http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1737" xml:lang="en">DSA-1737</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0595" xml:lang="en">ADV-2009-0595</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wesnoth.org/forum/viewtopic.php?t=24247" xml:lang="en">http://www.wesnoth.org/forum/viewtopic.php?t=24247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wesnoth.org/forum/viewtopic.php?t=24340" xml:lang="en">http://www.wesnoth.org/forum/viewtopic.php?t=24340</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49058" xml:lang="en">wesnoth-pythonai-code-execution(49058)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://gna.org/bugs/index.php?13048" xml:lang="en">https://gna.org/bugs/index.php?13048</vuln:reference>
    </vuln:references>
    <vuln:summary>The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0368">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.8.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.7:b"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.7:d"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.3"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.3:pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.4"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.5"/>
        <cpe-lang:fact-ref name="cpe:/a:opensc-project:opensc:0.11.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:opensc-project:opensc:0.3.2</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.3.5</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.4.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.5.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.6.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.6.1</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.7.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.8</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.8.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.8.0.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.8.1</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.2</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.3</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.4</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.5</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.6</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.7</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.7:b</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.7:d</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.9.8</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.10.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.10.1</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.0</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.1</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.2</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.3</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.3:pre3</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.4</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.5</vuln:product>
      <vuln:product>cpe:/a:opensc-project:opensc:0.11.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0368</vuln:cve-id>
    <vuln:published-datetime>2009-03-02T17:30:00.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:54.750-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/02/26/1" xml:lang="en">[oss-security] 20090226 OpenSC Security Advisory</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200908-01.xml" xml:lang="en">GLSA-200908-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1734" xml:lang="en">DSA-1734</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.opensc-project.org/pipermail/opensc-announce/2009-February/000023.html" xml:lang="en">[opensc-announce] 20090226 OpenSC Security Advisory</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33922" xml:lang="en">33922</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48958" xml:lang="en">opensc-pkcs-unauth-access(48958)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00673.html" xml:lang="en">FEDORA-2009-2266</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00686.html" xml:lang="en">FEDORA-2009-2267</vuln:reference>
    </vuln:references>
    <vuln:summary>OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0369">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0369</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.560-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48542" xml:lang="en">ie-onclickaction-click-hijacking(48542)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7912" xml:lang="en">7912</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 7 allows remote attackers to trick a user into visiting an arbitrary URL via an onclick action that moves a crafted element to the current mouse position, related to a "Clickjacking" vulnerability.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0370">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.2"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.2_l"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3_l"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:ibm:aix:5.2</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.2.2</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.2_l</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.7</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.8</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.9</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3_l</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1.1</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0370</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6028" name="oval:org.mitre.oval:def:6028"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory.asc" xml:lang="en">http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory.asc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ40386" xml:lang="en">IZ40386</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ41510" xml:lang="en">IZ41510</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ41593" xml:lang="en">IZ41593</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ41599" xml:lang="en">IZ41599</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ42785" xml:lang="en">IZ42785</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ42786" xml:lang="en">IZ42786</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ42787" xml:lang="en">IZ42787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ42788" xml:lang="en">IZ42788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33522" xml:lang="en">33522</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in IBM AIX 5.2.0 through 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0371">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sitexs_cms:sitexs_cms:0.1:pre-alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:sitexs_cms:sitexs_cms:0.1.1:pre-alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sitexs_cms:sitexs_cms:0.1:pre-alpha</vuln:product>
      <vuln:product>cpe:/a:sitexs_cms:sitexs_cms:0.1.1:pre-alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0371</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.873-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33457" xml:lang="en">33457</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0247" xml:lang="en">ADV-2009-0247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48236" xml:lang="en">sitexs-type-file-include(48236)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7879" xml:lang="en">7879</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in post.php in SiteXS CMS 0.1.1 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the type parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0372">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:1.0:final"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:1.5:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:1.5:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.0:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.0:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.5:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.5:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.9:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:2.9:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.0:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.0:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.1:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.1:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.2:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.3:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.3:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4.5:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.4.5:update"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.5.0:full"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:3.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:memht:memht_portal:4.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:memht:memht_portal:1.0:final</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:1.5:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:1.5:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.0:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.0:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.5:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.5:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.9:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:2.9:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.0:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.0:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.1</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.1:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.1:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.2:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.3:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.3:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4.5</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4.5:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.4.5:update</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.5.0:full</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.6.0</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.6.5</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.7.0</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.7.5</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.8.0</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.8.1</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.8.5</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:3.9.0</vuln:product>
      <vuln:product>cpe:/a:memht:memht_portal:4.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0372</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.933-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33424" xml:lang="en">33424</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48199" xml:lang="en">memht-avatar-file-upload(48199)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7859" xml:lang="en">7859</vuln:reference>
    </vuln:references>
    <vuln:summary>Unrestricted file upload vulnerability in index.php in Miltenovik Manojlo MemHT Portal 4.0.1 and earlier allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension and an image content type via a users editProfile action, then accessing this file via a direct request to the file in images/avatar/uploaded/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0373">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:elearningforce:flash_magazine_deluxe:_nil_"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:elearningforce:flash_magazine_deluxe:_nil_</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0373</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T14:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:46.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33455" xml:lang="en">33455</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0249" xml:lang="en">ADV-2009-0249</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48226" xml:lang="en">flashmagazine-index-sql-injection(48226)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7881" xml:lang="en">7881</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the ElearningForce Flash Magazine Deluxe (com_flashmagazinedeluxe) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mag_id parameter in a magazine action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0374">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0374</vuln:cve-id>
    <vuln:published-datetime>2009-01-30T16:30:00.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:29.040-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.secniche.org/gcr_clkj/" xml:lang="en">http://www.secniche.org/gcr_clkj/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500499/100/0/threaded" xml:lang="en">20090128 Advisory: Google Chrome 1.0.154.43 ClickJacking Vulnerability.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500533/100/0/threaded" xml:lang="en">20090128 Re: Advisory: Google Chrome 1.0.154.43 ClickJacking Vulnerability.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7903" xml:lang="en">7903</vuln:reference>
    </vuln:references>
    <vuln:summary>** DISPUTED **  Google Chrome 1.0.154.43 allows remote attackers to trick a user into visiting an arbitrary URL via an onclick action that moves a crafted element to the current mouse position, related to a "Clickjacking" vulnerability.  NOTE: a third party disputes the relevance of this issue, stating that "every sufficiently featured browser is and likely will remain susceptible to the behavior known as clickjacking," and adding that the exploit code "is not a valid demonstration of the issue."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0375">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:realnetworks:realplayer:11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:realnetworks:realplayer:11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0375</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T16:30:09.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:29.540-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://service.real.com/realplayer/security/01192010_player/en/" xml:lang="en">http://service.real.com/realplayer/security/01192010_player/en/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguardcenter.com/advisory/FGA-2009-04.html" xml:lang="en">http://www.fortiguardcenter.com/advisory/FGA-2009-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500722/100/0/threaded" xml:lang="en">20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33652" xml:lang="en">33652</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0178" xml:lang="en">ADV-2010-0178</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48567" xml:lang="en">realplayer-ivr-bo(48567)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a filename length field containing a large integer, which triggers overwrite of an arbitrary memory location with a 0x00 byte value, related to use of RealPlayer through a Windows Explorer plugin.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0376">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:realnetworks:realplayer:11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:realnetworks:realplayer:11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0376</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T16:30:09.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:30.227-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://service.real.com/realplayer/security/01192010_player/en/" xml:lang="en">http://service.real.com/realplayer/security/01192010_player/en/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortiguardcenter.com/advisory/FGA-2009-04.html" xml:lang="en">http://www.fortiguardcenter.com/advisory/FGA-2009-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500722/100/0/threaded" xml:lang="en">20090206 RealNetworks RealPlayer IVR File Processing Multiple Code Execute Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/509097/100/0/threaded" xml:lang="en">20100121 ZDI-10-009: RealNetworks RealPlayer IVR Format Remote Code Execution Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33652" xml:lang="en">33652</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0178" xml:lang="en">ADV-2010-0178</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-10-009/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-10-009/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48568" xml:lang="en">realplayer-ivr-code-execution(48568)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in a DLL file in RealNetworks RealPlayer 10, RealPlayer 10.5 6.0.12.1040 through 6.0.12.1741, RealPlayer 11 11.0.0 through 11.0.4, RealPlayer Enterprise, Mac RealPlayer 10 and 10.1, Linux RealPlayer 10, and Helix Player 10.x allows remote attackers to execute arbitrary code via a crafted Internet Video Recording (IVR) file with a modified field that controls an unspecified structure length and triggers heap corruption, related to use of RealPlayer through a Windows Explorer plugin.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0377">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_beamospetition:1.0.12"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_beamospetition:1.0.12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0377</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:00:00.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:31.150-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500250/100/0/threaded" xml:lang="en">20090121 Joomla component beamospetition 1.0.12 Sql Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33391" xml:lang="en">33391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7847" xml:lang="en">7847</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the beamospetition (com_beamospetition) 1.0.12 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the mpid parameter in a sign action to index.php, a different vector than CVE-2008-3132.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0378">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_beamospetition:1.0.12"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_beamospetition:1.0.12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0378</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:00:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:31.570-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500250/100/0/threaded" xml:lang="en">20090121 Joomla component beamospetition 1.0.12 Sql Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33391" xml:lang="en">33391</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7847" xml:lang="en">7847</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.php in the beamospetition (com_beamospetition) 1.0.12 component for Joomla! allows remote attackers to inject arbitrary web script or HTML via the pet parameter in a sign action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0379">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_pcchess"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_pcchess</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0379</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:00:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.230-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33394" xml:lang="en">33394</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48144" xml:lang="en">joomla-pcchess-gameid-sql-injection(48144)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7846" xml:lang="en">7846</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Prince Clan Chess Club (com_pcchess) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the game_id parameter in a showgame action to index.php, a different vector than CVE-2008-0761.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0380">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:sigsiu.net:sobi2:2.8.2:rc"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
          <cpe-lang:fact-ref name="cpe:/a:mambo-foundation:mambo"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sigsiu.net:sobi2:2.8.2:rc</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0380</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:00:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.293-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VIM</vuln:source>
      <vuln:reference href="http://www.attrition.org/pipermail/vim/2009-January/002136.html" xml:lang="en">20090130 SOBI2 showbiz SQL injection - false, or site-specific</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33378" xml:lang="en">33378</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48131" xml:lang="en">sobi2-bid-sql-injection(48131)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7841" xml:lang="en">7841</vuln:reference>
    </vuln:references>
    <vuln:summary>** DISPUTED **  SQL injection vulnerability in the Sigsiu Online Business Index 2 (SOBI2, com_sobi2) RC 2.8.2 component for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the bid parameter in a showbiz action to index.php, a different vector than CVE-2008-0607.  NOTE: CVE disputes this issue, since neither "showbiz" nor "bid" appears in the source code for SOBI2.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0381">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:bazaarbuilder:ecommerce_shopping_cart:5.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bazaarbuilder:ecommerce_shopping_cart:5.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0381</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:00:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.340-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33380" xml:lang="en">33380</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48141" xml:lang="en">bazaarbuilder-index-sql-injection(48141)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7840" xml:lang="en">7840</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the BazaarBuilder Ecommerce Shopping Cart (com_prod) 5.0 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the cid parameter in a products action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0382">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:internationalization:5.x-1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:internationalization:5.x-2.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:drupal"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:drupal:internationalization:5.x-1.1</vuln:product>
      <vuln:product>cpe:/a:drupal:internationalization:5.x-2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0382</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-02T14:30:00.203-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-02T14:46:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/358958" xml:lang="en">http://drupal.org/node/358958</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33283" xml:lang="en">33283</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Internationalization (i18n) Translation 5.x before 5.x-2.5, a module for Drupal, allows remote attackers with "translate node" permissions to bypass intended access restrictions and read unpublished nodes via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0383">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mzbservices:max.blog:1.0.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mzbservices:max.blog:1.0.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0383</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.403-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mzbservices.com/show_post.php?id=72" xml:lang="en">http://www.mzbservices.com/show_post.php?id=72</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33368" xml:lang="en">33368</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48125" xml:lang="en">maxblog-delete-security-bypass(48125)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7835" xml:lang="en">7835</vuln:reference>
    </vuln:references>
    <vuln:summary>delete.php in Max.Blog 1.0.6 does not properly restrict access, which allows remote attackers to delete arbitrary blog posts via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0384">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adam_tomecek:ownrs:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adam_tomecek:ownrs:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0384</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7849" xml:lang="en">7849</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in autor.php in OwnRS CMS 1.2 allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0385">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ffmpeg:ffmpeg"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ffmpeg:ffmpeg</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0385</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:32.540-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.ffmpeg.org/?p=ffmpeg;a=commitdiff;h=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17" xml:lang="en">http://git.ffmpeg.org/?p=ffmpeg;a=commitdiff;h=72e715fb798f2cb79fd24a6d2eaeafb7c6eeda17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-33.xml" xml:lang="en">GLSA-200903-33</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&amp;r2=16846&amp;pathrev=16846" xml:lang="en">http://svn.mplayerhq.hu/ffmpeg/trunk/libavformat/4xm.c?r1=16838&amp;r2=16846&amp;pathrev=16846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.mplayerhq.hu/ffmpeg?view=rev&amp;revision=16846" xml:lang="en">http://svn.mplayerhq.hu/ffmpeg?view=rev&amp;revision=16846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1781" xml:lang="en">DSA-1781</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1782" xml:lang="en">DSA-1782</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:297" xml:lang="en">MDVSA-2009:297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500514/100/0/threaded" xml:lang="en">20090128 [TKADV2009-004] FFmpeg Type Conversion Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33502" xml:lang="en">33502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.trapkit.de/advisories/TKADV2009-004.txt" xml:lang="en">http://www.trapkit.de/advisories/TKADV2009-004.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-734-1" xml:lang="en">USN-734-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0277" xml:lang="en">ADV-2009-0277</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48330" xml:lang="en">ffmpeg-fourxmreadheader-code-execution(48330)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00210.html" xml:lang="en">FEDORA-2009-3428</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00215.html" xml:lang="en">FEDORA-2009-3433</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer signedness error in the fourxm_read_header function in libavformat/4xm.c in FFmpeg before revision 16846 allows remote attackers to execute arbitrary code via a malformed 4X movie file with a large current_track value, which triggers a NULL pointer dereference.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0386">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.9</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.10</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0386</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:34.760-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10306" name="oval:org.mitre.oval:def:10306"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53" xml:lang="en">http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html" xml:lang="en">http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-11.xml" xml:lang="en">GLSA-200907-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://trapkit.de/advisories/TKADV2009-003.txt" xml:lang="en">http://trapkit.de/advisories/TKADV2009-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:035" xml:lang="en">MDVSA-2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/29/3" xml:lang="en">[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0271.html" xml:lang="en">RHSA-2009:0271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500317/100/0/threaded" xml:lang="en">20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33405" xml:lang="en">33405</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-736-1" xml:lang="en">USN-736-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0225" xml:lang="en">ADV-2009-0225</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481267" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481267</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 might allow remote attackers to execute arbitrary code via crafted Composition Time To Sample (ctts) atom data in a malformed QuickTime media .mov file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0387">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.11"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:plug-ins:0.8.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.9</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.10</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.11</vuln:product>
      <vuln:product>cpe:/a:gstreamer:plug-ins:0.8.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0387</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T14:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:36.477-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10611" name="oval:org.mitre.oval:def:10611"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53" xml:lang="en">http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html" xml:lang="en">http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-11.xml" xml:lang="en">GLSA-200907-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://trapkit.de/advisories/TKADV2009-003.txt" xml:lang="en">http://trapkit.de/advisories/TKADV2009-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:035" xml:lang="en">MDVSA-2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/29/3" xml:lang="en">[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0271.html" xml:lang="en">RHSA-2009:0271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500317/100/0/threaded" xml:lang="en">20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33405" xml:lang="en">33405</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-736-1" xml:lang="en">USN-736-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0225" xml:lang="en">ADV-2009-0225</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481267" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481267</vuln:reference>
    </vuln:references>
    <vuln:summary>Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted Sync Sample (aka stss) atom data in a malformed QuickTime media .mov file, related to "mark keyframes."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0388">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tightvnc:tightvnc:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ultravnc:ultravnc:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ultravnc:ultravnc:1.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tightvnc:tightvnc:1.3.9</vuln:product>
      <vuln:product>cpe:/a:ultravnc:ultravnc:1.0.2</vuln:product>
      <vuln:product>cpe:/a:ultravnc:ultravnc:1.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0388</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:38.790-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://forum.ultravnc.info/viewtopic.php?t=14654" xml:lang="en">http://forum.ultravnc.info/viewtopic.php?t=14654</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&amp;revision=3564" xml:lang="en">http://vnc-tight.svn.sourceforge.net/viewvc/vnc-tight?view=rev&amp;revision=3564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/vnc-integer-overflows" xml:lang="en">http://www.coresecurity.com/content/vnc-integer-overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500632/100/0/threaded" xml:lang="en">20090203 CORE-2008-1009 - VNC Multiple Integer Overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33568" xml:lang="en">33568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0321" xml:lang="en">ADV-2009-0321</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0322" xml:lang="en">ADV-2009-0322</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7990" xml:lang="en">7990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8024" xml:lang="en">8024</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer signedness errors in (1) UltraVNC 1.0.2 and 1.0.5 and (2) TightVnc 1.3.9 allow remote VNC servers to cause a denial of service (heap corruption and application crash) or possibly execute arbitrary code via a large length value in a message, related to the (a) ClientConnection::CheckBufferSize and (b) ClientConnection::CheckFileZipBufferSize functions in ClientConnection.cpp.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0389">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:eztools-software:web_on_windows_activex:2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:eztools-software:web_on_windows_activex:2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0389</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T17:00:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.717-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33515" xml:lang="en">33515</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48337" xml:lang="en">wow-writeinifilestring-code-execution(48337)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7910" xml:lang="en">7910</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple insecure method vulnerabilities in the Web On Windows (WOW) ActiveX control in WOW ActiveX 2 allow remote attackers to (1) create and overwrite arbitrary files via the WriteIniFileString method, (2) execute arbitrary programs via the ShellExecute method, (3) read from the registry via unspecified vectors, and (4) write to the registry via unspecified vectors.  NOTE: vectors 1 and 2 can be used together to execute arbitrary code.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0390">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:enomaly:elastic_computing_platform:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:enomaly:elastic_computing_platform:2.1:beta_2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:enomaly:elastic_computing_platform:2.1</vuln:product>
      <vuln:product>cpe:/a:enomaly:elastic_computing_platform:2.1:beta_2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0390</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T17:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:39.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500573/100/0/threaded" xml:lang="en">20090130 CVE-2008-4990 Enomaly ECP/Enomalism: Insecure temporary file creation vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:summary>Argument injection vulnerability in Enomaly Elastic Computing Platform (ECP), formerly Enomalism, before 2.1.1 allows local users to send signals to arbitrary processes by populating the /tmp/enomalism2.pid file with command-line arguments for the kill program.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0391">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:ibm:zos"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0391</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T17:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:25.673-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33533" xml:lang="en">33533</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021658" xml:lang="en">1021658</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0423" xml:lang="en">ADV-2009-0423</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK79232" xml:lang="en">PK79232</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in IBM WebSphere Application Server (WAS) 6.0.1 on z/OS allows attackers to read arbitrary files via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0392">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:motorola:cpei300"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:motorola:cpei300</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0392</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T20:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:39.900-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500545/100/0/threaded" xml:lang="en">20090129 Motorola Wimax Modem CPEi300 Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33519" xml:lang="en">33519</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7915" xml:lang="en">7915</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0393">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:motorola:cpei300"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:motorola:cpei300</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0393</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T20:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:40.213-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500545/100/0/threaded" xml:lang="en">20090129 Motorola Wimax Modem CPEi300 Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33519" xml:lang="en">33519</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7915" xml:lang="en">7915</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to inject arbitrary web script or HTML via the page parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0394">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ple_cms:ple_cms:1.0:beta_4.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ple_cms:ple_cms:1.0:beta_4.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0394</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T20:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.917-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33524" xml:lang="en">33524</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7917" xml:lang="en">7917</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in Pre Lecture Exercises (PLEs) CMS 1.0 beta 4.2 allows remote attackers to execute arbitrary SQL commands via the school parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0395">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:netartmedia:car_portal:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:netartmedia:car_portal:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0395</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T20:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:47.967-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33521" xml:lang="en">33521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7916" xml:lang="en">7916</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the login feature in NetArt Media Car Portal 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0396">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:k530i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:k610i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:k618i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:k660i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:k810i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:w660i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:w880i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:w910i"/>
        <cpe-lang:fact-ref name="cpe:/h:sony_ericsson:z610i"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:sony_ericsson:k530i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:k610i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:k618i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:k660i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:k810i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:w660i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:w880i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:w910i</vuln:product>
      <vuln:product>cpe:/h:sony_ericsson:z610i</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0396</vuln:cve-id>
    <vuln:published-datetime>2009-02-02T20:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:40.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.mseclab.com/index.php?page_id=123" xml:lang="en">http://www.mseclab.com/index.php?page_id=123</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500382/100/0/threaded" xml:lang="en">20090126 SonyEricsson WAP Push Denial of Service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33433" xml:lang="en">33433</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021634" xml:lang="en">1021634</vuln:reference>
    </vuln:references>
    <vuln:summary>The Sony Ericsson W910i, W660i, K618i, K610i, Z610i, K810i, K660i, W880i, and K530i phones allow remote attackers to cause a denial of service (device reboot or hang-up) via a malformed WAP Push packet to (1) SMS or (2) UDP port 2948.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0397">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:good_plug-ins:0.10.11"/>
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:plug-ins:0.8.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.9</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.10</vuln:product>
      <vuln:product>cpe:/a:gstreamer:good_plug-ins:0.10.11</vuln:product>
      <vuln:product>cpe:/a:gstreamer:plug-ins:0.8.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0397</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T06:30:00.780-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:40.947-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9942" name="oval:org.mitre.oval:def:9942"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53" xml:lang="en">http://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=bdc20b9baf13564d9a061343416395f8f9a92b53</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html" xml:lang="en">http://gstreamer.freedesktop.org/releases/gst-plugins-good/0.10.12.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-11.xml" xml:lang="en">GLSA-200907-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-052.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-052.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://trapkit.de/advisories/TKADV2009-003.txt" xml:lang="en">http://trapkit.de/advisories/TKADV2009-003.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:035" xml:lang="en">MDVSA-2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/29/3" xml:lang="en">[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0270.html" xml:lang="en">RHSA-2009:0270</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0271.html" xml:lang="en">RHSA-2009:0271</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500317/100/0/threaded" xml:lang="en">20090122 [TKADV2009-003] GStreamer Heap Overflow and Array Index out of Bounds Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33405" xml:lang="en">33405</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-736-1" xml:lang="en">USN-736-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0225" xml:lang="en">ADV-2009-0225</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=481267" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=481267</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48555" xml:lang="en">gstreamer-qtdemuxparse-bo(48555)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plugins-good) 0.10.9 through 0.10.11, and GStreamer Plug-ins (aka gstreamer-plugins) 0.8.5, might allow remote attackers to execute arbitrary code via crafted Time-to-sample (aka stts) atom data in a malformed QuickTime media .mov file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0398">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:plug-ins:0.6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gstreamer:plug-ins:0.6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0398</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T06:30:00.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.090-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9886" name="oval:org.mitre.oval:def:9886"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/29/3" xml:lang="en">[oss-security] 20090129 CVE Request -- (sort of urgent) gstreamer-plugins-good (repost) (more details about affected versions -- final version)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0269.html" xml:lang="en">RHSA-2009:0269</vuln:reference>
    </vuln:references>
    <vuln:summary>Array index error in the gst_qtp_trak_handler function in gst/qtdemux/qtdemux.c in GStreamer Plug-ins (aka gstreamer-plugins) 0.6.0 allows remote attackers to have an unknown impact via a crafted QuickTime media file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0399">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:chipmunk_scripts:chipmunk_blogger"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:chipmunk_scripts:chipmunk_blogger</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0399</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.137-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-16"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7894" xml:lang="en">7894</vuln:reference>
    </vuln:references>
    <vuln:summary>Chipmunk Blogger Script allows remote attackers to gain administrator privileges via a direct request to admin/reguser.php.  NOTE: this is only a vulnerability when the administrator does not properly follow installation directions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0400">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:socialengine:socialengine:3.06::trial"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:socialengine:socialengine:3.06::trial</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0400</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33495" xml:lang="en">33495</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48316" xml:lang="en">socialengine-blog-sql-injection(48316)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7900" xml:lang="en">7900</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in blog.php in SocialEngine 3.06 trial allows remote attackers to execute arbitrary SQL commands via the category_id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0401">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ephpscripts:e-php_cms"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ephpscripts:e-php_cms</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0401</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:55.627-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/0901-exploits/ephpcmscid-sql.txt" xml:lang="en">http://packetstormsecurity.org/0901-exploits/ephpcmscid-sql.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33470" xml:lang="en">33470</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48297" xml:lang="en">ephpcms-browsecats-sql-injection(48297)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in browsecats.php in E-Php CMS allows remote attackers to execute arbitrary SQL commands via the cid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0402">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.7"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.8"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.26.9"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.27.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.2"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.3"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.28.10"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.1"/>
        <cpe-lang:fact-ref name="cpe:/a:gplhost:domain_technologie_control:0.29.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.7</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.8</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.26.9</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.27.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.2</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.3</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.28.10</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.1</vuln:product>
      <vuln:product>cpe:/a:gplhost:domain_technologie_control:0.29.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0402</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:55.687-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://freshmeat.net/projects/dtc/?branch_id=22759&amp;release_id=292973" xml:lang="en">http://freshmeat.net/projects/dtc/?branch_id=22759&amp;release_id=292973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.gplhost.com/gitweb/?p=dtc.git;a=commitdiff;h=056e1d1849ff3aa183a410e2aab1c1c3e969247d" xml:lang="en">http://git.gplhost.com/gitweb/?p=dtc.git;a=commitdiff;h=056e1d1849ff3aa183a410e2aab1c1c3e969247d</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33496" xml:lang="en">33496</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48292" xml:lang="en">domaintechnologie-newaccount-sql-injection(48292)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in client/new_account.php in Domain Technologie Control (DTC) before 0.29.16 allows remote attackers to execute arbitrary SQL commands via the (1) familyname, (2) christname, (3) company_name, (4) is_company, (5) email, (6) phone, (7) fax, (8) addr1, (9) addr2, (10) addr3, (11) zipcode, (12) city, (13) state, (14) country, and (15) vat_num parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0403">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:chipmunk_scripts:chipmunk_blogger"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:chipmunk_scripts:chipmunk_blogger</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0403</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0267" xml:lang="en">ADV-2009-0267</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48313" xml:lang="en">chipmunkblog-authenticate-sql-injection(48313)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7894" xml:lang="en">7894</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in admin/authenticate.php in Chipmunk Blogger Script allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0404">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:bioinformatics:htmlawed:1.1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.1</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.2</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.3</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.4</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.5</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.6</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.7</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.8</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.0.9</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.1</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.1.1</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.1.2</vuln:product>
      <vuln:product>cpe:/a:bioinformatics:htmlawed:1.1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0404</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:55.797-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://freshmeat.net/projects/htmlawed/?branch_id=74760&amp;release_id=293026" xml:lang="en">http://freshmeat.net/projects/htmlawed/?branch_id=74760&amp;release_id=293026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://freshmeat.net/projects/htmlawed/?branch_id=74760&amp;release_id=293090" xml:lang="en">http://freshmeat.net/projects/htmlawed/?branch_id=74760&amp;release_id=293090</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bioinformatics.org/phplabware/forum/viewtopic.php?id=85" xml:lang="en">http://www.bioinformatics.org/phplabware/forum/viewtopic.php?id=85</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bioinformatics.org/phplabware/internal_utilities/htmLawed/htmLawed_README.htm#s4.3" xml:lang="en">http://www.bioinformatics.org/phplabware/internal_utilities/htmLawed/htmLawed_README.htm#s4.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33507" xml:lang="en">33507</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48333" xml:lang="en">htmlawed-unspecified-xss(48333)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Bioinformatics htmLawed 1.1.3 and 1.1.4 allow remote attackers to inject arbitrary web script or HTML via invalid Cascading Style Sheets (CSS) expressions in the style attribute, which is processed by Internet Explorer 7.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0405">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:smartsitecms:smartsitecms:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:smartsitecms:smartsitecms:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0405</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33497" xml:lang="en">33497</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48321" xml:lang="en">smartsitecms-articles-sql-injection(48321)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7901" xml:lang="en">7901</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in articles.php in smartSite CMS 1.0 allows remote attackers to execute arbitrary SQL commands via the var parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0406">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:community_cms:community_cms:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:community_cms:community_cms:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:community_cms:community_cms:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:community_cms:community_cms:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:community_cms:community_cms:0.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:community_cms:community_cms:0.1</vuln:product>
      <vuln:product>cpe:/a:community_cms:community_cms:0.1.1</vuln:product>
      <vuln:product>cpe:/a:community_cms:community_cms:0.2</vuln:product>
      <vuln:product>cpe:/a:community_cms:community_cms:0.3</vuln:product>
      <vuln:product>cpe:/a:community_cms:community_cms:0.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0406</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.370-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33484" xml:lang="en">33484</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0265" xml:lang="en">ADV-2009-0265</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48304" xml:lang="en">communitycms-index-sql-injection(48304)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7892" xml:lang="en">7892</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Community CMS 0.4 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0407">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:humayun_shabbir:php-cms_project:1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:humayun_shabbir:php-cms_project:1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0407</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.433-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33473" xml:lang="en">33473</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0244" xml:lang="en">ADV-2009-0244</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48267" xml:lang="en">phpcms-login-sql-injection(48267)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7876" xml:lang="en">7876</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in admin/login.php in PHP-CMS Project 1 allows remote attackers to execute arbitrary SQL commands via the username parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0408">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:oscommerce:oscommerce:2.2:rc_2a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:oscommerce:oscommerce:2.2:rc_2a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0408</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48289" xml:lang="en">oscommerce-unspecified-csrf(48289)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in osCommerce 2.2 RC 2a allows remote attackers to hijack the authentication of administrators.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0409">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mzbservices:max.blog:1.0.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mzbservices:max.blog:1.0.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0409</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:44.120-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500470/100/0/threaded" xml:lang="en">20090127 Max.Blog &lt;= 1.0.6 (offline_auth.php) Offline Authentication Bypass</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33493" xml:lang="en">33493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7899" xml:lang="en">7899</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in offline_auth.php in Max.Blog 1.0.6 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the username parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0410">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.01"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.02x"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:7.03:hp1a"/>
        <cpe-lang:fact-ref name="cpe:/a:novell:groupwise:8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:groupwise:6.5</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.0</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.01</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.02x</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:7.03:hp1a</vuln:product>
      <vuln:product>cpe:/a:novell:groupwise:8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0410</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:44.573-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://download.novell.com/Download?buildid=GjZRRdqCFW0" xml:lang="en">http://download.novell.com/Download?buildid=GjZRRdqCFW0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.novell.com/support/viewContent.do?externalId=7002502" xml:lang="en">http://www.novell.com/support/viewContent.do?externalId=7002502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500609/100/0/threaded" xml:lang="en">20090202 ZDI-09-010: Novell Netware Groupwise GWIA RCPT Command Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33560" xml:lang="en">33560</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-010/" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-010/</vuln:reference>
    </vuln:references>
    <vuln:summary>Off-by-one error in the SMTP daemon in GroupWise Internet Agent (GWIA) in Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0 allows remote attackers to execute arbitrary code via a long e-mail address in a malformed RCPT command, leading to a buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0411">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.152.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.2.153.1"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.0"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.3.154.3"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.18"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.22"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.31"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:0.4.154.33"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.36"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.39"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.42"/>
        <cpe-lang:fact-ref name="cpe:/a:google:chrome:1.0.154.43"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:google:chrome:0.2.152.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.2.153.1</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.0</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.3.154.3</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.18</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.22</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.31</vuln:product>
      <vuln:product>cpe:/a:google:chrome:0.4.154.33</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.36</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.39</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.42</vuln:product>
      <vuln:product>cpe:/a:google:chrome:1.0.154.43</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0411</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T14:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.047-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://codereview.chromium.org/11264" xml:lang="en">http://codereview.chromium.org/11264</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://codereview.chromium.org/18533" xml:lang="en">http://codereview.chromium.org/18533</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes" xml:lang="en">http://sites.google.com/a/chromium.org/dev/getting-involved/dev-channel/release-notes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=8529" xml:lang="en">http://src.chromium.org/viewvc/chrome?view=rev&amp;revision=8529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48554" xml:lang="en">googlechrome-xmlhttprequest-info-disclosure(48554)</vuln:reference>
    </vuln:references>
    <vuln:summary>Google Chrome before 1.0.154.46 does not properly restrict access from web pages to the (1) Set-Cookie and (2) Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls and other web script.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0412">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:interspire:shopping_cart:4.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:interspire:shopping_cart:4.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0412</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T15:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:45.040-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499967/100/0/threaded" xml:lang="en">20090112 [BMSA-2009-01] Authentication bypass in Interspire Shopping Cart v4.0.1 and below</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33212" xml:lang="en">33212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021557" xml:lang="en">1021557</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47899" xml:lang="en">interspire-classauth-security-bypass(47899)</vuln:reference>
    </vuln:references>
    <vuln:summary>The ProcessLogin function in class.auth.php in Interspire Shopping Cart (ISC) 4.0.1 Ultimate edition allows remote attackers to bypass authentication and obtain administrative access by reusing the RememberToken cookie after a failed admin login attempt.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0413">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:roundcube:webmail:0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:roundcube:webmail:0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0413</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T18:30:00.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.157-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.roundcube.net/changeset/2245" xml:lang="en">http://trac.roundcube.net/changeset/2245</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33372" xml:lang="en">33372</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0192" xml:lang="en">ADV-2009-0192</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48129" xml:lang="en">roundcube-html-xss(48129)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-February/msg00082.html" xml:lang="en">FEDORA-2009-1256</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in RoundCube Webmail (roundcubemail) 0.2 stable allows remote attackers to inject arbitrary web script or HTML via the background attribute embedded in an HTML e-mail message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0414">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tor:tor"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre24"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.2_pre27"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.0.9.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.1_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.2_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.3_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.4_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.5_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.6_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.7_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.8_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.9_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.10_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.1_alpha-cvs"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.8:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.1.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.20:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.21:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.22:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.23:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.24:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.25:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.26:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.27:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.28:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.32:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.1.1.12:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tor:tor</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre24</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.2_pre27</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.6.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.7.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.8.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.0.9.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.0.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.1_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.2_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.3_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.4_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.5_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.6_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.7_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.8_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.9_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.10_alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.20</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.21</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.22</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.23</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.25</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.1.26</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.1_alpha-cvs</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.4</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.8:beta</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.9</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.10</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.11</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.12</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.13</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.14</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.15</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.16</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.17</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.18</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.19</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.30</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.1.2.31</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.20:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.21:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.22:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.23:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.24:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.25:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.26:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.27:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.28:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.32:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.1.1.12:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0414</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T18:30:01.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:27.813-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://archives.seul.org/or/announce/Jan-2009/msg00000.html" xml:lang="en">[or-announce] 20090122 Tor 0.2.0.33 is released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" xml:lang="en">http://blog.torproject.org/blog/tor-0.2.0.33-stable-released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-11.xml" xml:lang="en">GLSA-200904-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33399" xml:lang="en">33399</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021633" xml:lang="en">1021633</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0210" xml:lang="en">ADV-2009-0210</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" xml:lang="en">FEDORA-2009-0897</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0415">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:monkey:trickle:1.07"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:monkey:trickle:1.07</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0415</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T18:30:01.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-04T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-04T10:46:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513456" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513456</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/29/5" xml:lang="en">[oss-security] 20090129 CVE Request (trickle)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33516" xml:lang="en">33516</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in trickle 1.07 allows local users to execute arbitrary code via a Trojan horse trickle-overload.so in the current working directory, which is referenced in the LD_PRELOAD path.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0416">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:standards_based_linux_instrumentation:sblim-sfcb:1.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:standards_based_linux_instrumentation:sblim-sfcb:1.3.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0416</vuln:cve-id>
    <vuln:published-datetime>2009-02-03T18:30:01.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-20T01:47:30.703-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" xml:lang="en">SUSE-SR:2009:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=874261" xml:lang="en">[oss-security] 20090203 CVE Request: sblim-sfcb genSslCert.sh temp race</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2561165&amp;group_id=128809&amp;atid=712784" xml:lang="en">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2561165&amp;group_id=128809&amp;atid=712784</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33583" xml:lang="en">33583</vuln:reference>
    </vuln:references>
    <vuln:summary>The SSL certificate setup program (genSslCert.sh) in Standards Based Linux Instrumentation for Manageability (SBLIM) sblim-sfcb 1.3.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /var/tmp/key.pem, (2) /var/tmp/cert.pem, and (3) /var/tmp/ssl.cnf temporary files.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0417">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.0:rc7"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.3"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.4"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.5"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.6"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:0.11.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:agavi:agavi:1.0.0:beta7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc3</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc4</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc5</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc6</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.0:rc7</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.1:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.1:rc2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.1:rc3</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.2:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.2:rc2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.3</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.3:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.3:rc2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.4</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.4:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.5</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.5:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.6</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.6:rc1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:0.11.6:rc2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:agavi:agavi:1.0.0:beta7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0417</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:20.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-13T01:46:54.280-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability" xml:lang="en">http://blog.agavi.org/post/75829956/agavi-0-11-6-released-fixes-vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability" xml:lang="en">http://blog.agavi.org/post/75830918/agavi-1-0-0-beta-8-released-fixes-vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.agavi.org/ticket/1019" xml:lang="en">http://trac.agavi.org/ticket/1019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33826" xml:lang="en">33826</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the AgaviWebRouting::gen(null) method in Agavi 0.11 before 0.11.6 and 1.0 before 1.0.0 beta 8 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with certain characters that are not properly handled by web browsers that do not strictly follow RFC 3986, such as Internet Explorer 6 and 7.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0418">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.23"/>
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.31"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.11</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.23</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.31</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0418</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5943" name="oval:org.mitre.oval:def:5943"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021660" xml:lang="en">1021660</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0312" xml:lang="en">ADV-2009-0312</vuln:reference>
    </vuln:references>
    <vuln:summary>The IPv6 Neighbor Discovery Protocol (NDP) implementation in HP HP-UX B.11.11, B.11.23, and B.11.31 does not validate the origin of Neighbor Discovery messages, which allows remote attackers to cause a denial of service (loss of connectivity), read private network traffic, and possibly execute arbitrary code via a spoofed message that modifies the Forward Information Base (FIB), a related issue to CVE-2008-2476.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0419">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:xml_core_services"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:xml_core_services</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0419</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T14:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.237-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=380418" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=380418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48815" xml:lang="en">msxml-httponly-cookie-information-disclosure(48815)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft XML Core Services, as used in Microsoft Expression Web, Office, Internet Explorer 6 and 7, and other products, does not properly restrict access from web pages to Set-Cookie2 HTTP response headers, which allows remote attackers to obtain sensitive information from cookies via XMLHttpRequest calls, related to the HTTPOnly protection mechanism.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-4033.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0420">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:rd-media:rd-autos:1.5.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rd-media:rd-autos:1.5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0420</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33297" xml:lang="en">33297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7795" xml:lang="en">7795</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the RD-Autos (com_rdautos) 1.5.5 Stable component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0421">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6.2"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6.3"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6.4"/>
          <cpe-lang:fact-ref name="cpe:/a:joomla:com_eventing:1.6.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6</vuln:product>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6.1</vuln:product>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6.2</vuln:product>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6.3</vuln:product>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6.4</vuln:product>
      <vuln:product>cpe:/a:joomla:com_eventing:1.6.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0421</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.653-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33296" xml:lang="en">33296</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48016" xml:lang="en">eventing-index-sql-injection(48016)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7793" xml:lang="en">7793</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Eventing (com_eventing) 1.6.x component for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0422">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.4b"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.5b"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:1.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.8.12"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tincan:phplist:2.10.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tincan:phplist:1.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.0.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.2b</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.3b</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.4b</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.5b</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.6</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.1.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.3.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.3.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.4.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.5.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.5.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.6.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.6.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.6.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.6.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.7.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.7.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.8.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.9.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.9.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.9.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:1.9.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.1.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.1.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.1.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.1.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.2.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.2.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.3.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.3.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.3.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.3.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.3.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.4.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.4.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.6</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.5.8</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.0</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.6.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.7.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.7.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.8.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.8.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.8.12</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.9.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.9.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.9.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.1</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.2</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.3</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.4</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.5</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.6</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.7</vuln:product>
      <vuln:product>cpe:/a:tincan:phplist:2.10.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0422</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:45.493-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.bugreport.ir/index_60.htm" xml:lang="en">http://www.bugreport.ir/index_60.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500057/100/0/threaded" xml:lang="en">20090114 phpList &lt;= 2.10.8 Local File inclusion</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47945" xml:lang="en">phplist-indexphp-file-include(47945)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7778" xml:lang="en">7778</vuln:reference>
    </vuln:references>
    <vuln:summary>Dynamic variable evaluation vulnerability in lists/admin.php in phpList 2.10.8 and earlier, when register_globals is disabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the _SERVER[ConfigFile] parameter to admin/index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0423">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:kevin_walker:php_photo_album:0.8:beta"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:kevin_walker:php_photo_album:0.8:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0423</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33277" xml:lang="en">33277</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48017" xml:lang="en">phpphotoalbum-index-file-include(48017)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7786" xml:lang="en">7786</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in index.php in Php Photo Album (PHPPA) 0.8 BETA allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the preview parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0424">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:0.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:2.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:an_guestbook:an_guestbook:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.3.1</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.3.2</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.3.3</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.3.4</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.3.5</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.4</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.4.1</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.4.5</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.5</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.6</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.7</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.7.1</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.7.5</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:0.7.6</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:1.0</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:1.1</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:1.2</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:1.5</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:2.0</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:2.1</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:2.2</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:2.2a</vuln:product>
      <vuln:product>cpe:/a:an_guestbook:an_guestbook:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0424</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.470-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=907703" xml:lang="en">http://sourceforge.net/forum/forum.php?forum_id=907703</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=653720" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=653720</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33292" xml:lang="en">33292</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48018" xml:lang="en">anguestbook-sign1-xss(48018)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in sign1.php in AN Guestbook (ANG) before 0.7.7 allows remote attackers to inject arbitrary web script or HTML via the country parameter, which is not properly handled in (1) administrator/manage.php or (2) administrator/trash.php.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0425">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:blue_eye_cms:blue_eye_cms:1.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:blue_eye_cms:blue_eye_cms:1.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0425</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.810-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33303" xml:lang="en">33303</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7797" xml:lang="en">7797</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Blue Eye CMS 1.0.0 and earlier allows remote attackers to execute arbitrary SQL commands via the clanek parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0426">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:classified_listings_manager:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:classified_listings_manager:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0426</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.287-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33253" xml:lang="en">33253</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47959" xml:lang="en">classifieds-uploadimage-sql-injection(47959)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7767" xml:lang="en">7767</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in CategoryManager/upload_image_category.asp in DMXReady Classified Listings Manager 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0427">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:member_directory_manager:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:member_directory_manager:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0427</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.333-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=knowledgebase&amp;_a=viewarticle&amp;kbarticleid=93" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=knowledgebase&amp;_a=viewarticle&amp;kbarticleid=93</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33253" xml:lang="en">33253</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47960" xml:lang="en">memberdirectory-uploadimage-sql-injection(47960)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7773" xml:lang="en">7773</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in CategoryManager/upload_image_category.asp in DMXReady Member Directory Manager 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0428">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:secure_document_library:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:dmxready:secure_document_library:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:secure_document_library:1.0</vuln:product>
      <vuln:product>cpe:/a:dmxready:secure_document_library:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0428</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.440-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=knowledgebase&amp;_a=viewarticle&amp;kbarticleid=93" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=knowledgebase&amp;_a=viewarticle&amp;kbarticleid=93</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12" xml:lang="en">http://dmxready.helpserve.com/index.php?_m=news&amp;_a=viewnews&amp;newsid=12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33253" xml:lang="en">33253</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48013" xml:lang="en">securedocumentlibrary-uploadimage-sql-inj(48013)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7787" xml:lang="en">7787</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in CategoryManager/upload_image_category.asp in DMXReady Secure Document Library 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the cid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0429">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:activewebsoftwares:active_bids"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:activewebsoftwares:active_bids</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0429</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:46.137-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500144/100/0/threaded" xml:lang="en">20090116 Active Bids</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33306" xml:lang="en">33306</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in Active Bids allow remote attackers to execute arbitrary SQL commands via the (1) search parameter to search.asp, (2) SortDir parameter to auctionsended.asp, and the (3) catid parameter to wishlist.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0430">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:activewebsoftwares:active_bids"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:activewebsoftwares:active_bids</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0430</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:46.323-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500144/100/0/threaded" xml:lang="en">20090116 Active Bids</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33306" xml:lang="en">33306</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Active Bids allow remote attackers to inject arbitrary web script or HTML via the (1) search parameter to search.asp and the (2) URL parameter to tellafriend.asp.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0431">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:codefixer:linkspro:_nil_:_nil_:standard"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:codefixer:linkspro:_nil_:_nil_:standard</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0431</vuln:cve-id>
    <vuln:published-datetime>2009-02-04T19:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-05T13:34:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/0901-exploits/linkspro-sql.txt" xml:lang="en">http://packetstormsecurity.org/0901-exploits/linkspro-sql.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33305" xml:lang="en">33305</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in Default.asp in LinksPro Standard Edition allows remote attackers to execute arbitrary SQL commands via the OrderDirection parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0432">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0432</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48522" xml:lang="en">websphere-file-transfer-info-disclosure(48522)</vuln:reference>
    </vuln:references>
    <vuln:summary>The installation process for the File Transfer servlet in the System Management/Repository component in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.19 does not enable the secure version, which allows remote attackers to obtain sensitive information via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0433">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.24</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.28</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0433</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.750-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006879" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006879</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007033" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1PK63499" xml:lang="en">PK63499</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48523" xml:lang="en">websphere-server-plugin-dos(48523)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1.x before 5.1.1.19, 6.0.x before 6.0.2.29, and 6.1.x before 6.1.0.19, when Web Server plug-in content buffering is enabled, allows attackers to cause a denial of service (daemon crash) via unknown vectors, related to a mishandling of client read failures in which clients receive many 500 HTTP error responses and backend servers are incorrectly labeled as down.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0434">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.24</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.28</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.30</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.31</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0434</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.813-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>1.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0423" xml:lang="en">ADV-2009-0423</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006876" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006876</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1PK79230" xml:lang="en">PK79230</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48524" xml:lang="en">websphere-pmi-information-disclosure(48524)</vuln:reference>
    </vuln:references>
    <vuln:summary>PerfServlet in the PMI/Performance Tools component in IBM WebSphere Application Server (WAS) 6.0.x before 6.0.2.31, 6.1.x before 6.1.0.21, and 7.0.x before 7.0.0.1, when Performance Monitoring Infrastructure (PMI) is enabled, allows local users to obtain sensitive information by reading the (1) systemout.log and (2) ffdc files.  NOTE: this is probably a duplicate of CVE-2008-5413.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0435">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.6"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.14"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.14</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0435</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.877-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=0&amp;uid=swg24019205" xml:lang="en">PK64529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48525" xml:lang="en">websphere-libibmaio-dos(48525)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the IBM Asynchronous I/O (aka AIO or libibmaio) library in the Java Message Service (JMS) component in IBM WebSphere Application Server (WAS) 6.1.x before 6.1.0.17 on AIX 5.3 allows attackers to cause a denial of service (daemon crash) via vectors related to the aio_getioev2 and getEvent methods.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0436">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.1.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.24</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.28</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.30</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0436</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:56.937-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006876" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006876</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007033" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007033</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27007951" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27007951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27008517" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27008517</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48526" xml:lang="en">websphere-http-afunix-incorrect-permissions(48526)</vuln:reference>
    </vuln:references>
    <vuln:summary>The (1) mod_ibm_ssl and (2) mod_cgid modules in IBM HTTP Server 6.0.x before 6.0.2.31 and 6.1.x before 6.1.0.19, as used in WebSphere Application Server (WAS), set incorrect permissions for AF_UNIX sockets, which has unknown impact and local attack vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0437">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0437</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>1.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33849" xml:lang="en">33849</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48527" xml:lang="en">websphere-install-log-info-disclosure(48527)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Installation Factory installation process for IBM WebSphere Application Server (WAS) 6.0.2 on Windows, when WAS is registered as a Windows service, allows local users to obtain sensitive information by reading the logs/instconfigifwas6.log log file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0438">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0438</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T17:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.080-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33700" xml:lang="en">33700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48528" xml:lang="en">websphere-jsp-win-information-disclosure(48528)</vuln:reference>
    </vuln:references>
    <vuln:summary>IBM WebSphere Application Server (WAS) 7 before 7.0.0.1 on Windows allows remote attackers to bypass "Authorization checking" and obtain sensitive information from JSP pages via a crafted request.  NOTE: this is probably a duplicate of CVE-2008-5412.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0439">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:5.3:-:express"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:5.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:6.0.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_mq:7.0.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_mq:5.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:5.3:-:express</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:5.3.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.1.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_mq:7.0.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0439</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T12:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33857" xml:lang="en">33857</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27006037" xml:lang="en">http://www-01.ibm.com/support/docview.wss?rs=171&amp;uid=swg27006037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48529" xml:lang="en">websphere-mq-privilege-escalation(48529)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the queue manager in IBM WebSphere MQ (WMQ) 5.3, 6.0 before 6.0.2.6, and 7.0 before 7.0.0.2 allows local users to gain privileges via vectors related to the (1) setmqaut, (2) dmpmqaut, and (3) dspmqaut authorization commands.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0440">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_partner_gateway:6.0.0.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_partner_gateway:6.0.0.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0440</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.220-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33839" xml:lang="en">33839</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21330341" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21330341</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1JR31231" xml:lang="en">JR31231</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48530" xml:lang="en">websphere-pgateway-rnif-signatures(48530)</vuln:reference>
    </vuln:references>
    <vuln:summary>IBM WebSphere Partner Gateway (WPG) 6.0.0 through 6.0.0.7 does not properly handle failures of signature verification, which might allow remote authenticated users to submit a crafted RosettaNet (aka RNIF) document to a backend application, related to (1) "altered service content" and (2) "digital signature foot-print."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0441">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:technote:technote:7.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:technote:technote:7.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0441</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:22.780-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.873-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33592" xml:lang="en">33592</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7965" xml:lang="en">7965</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in skin_shop/standard/2_view_body/body_default.php in TECHNOTE 7.2, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the shop_this_skin_path parameter, a different vector than CVE-2008-4138.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0442">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpbbbook:phpbbbook:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:phpbbbook:phpbbbook:1.3h"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpbbbook:phpbbbook:1.3</vuln:product>
      <vuln:product>cpe:/a:phpbbbook:phpbbbook:1.3h</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0442</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:22.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.917-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33603" xml:lang="en">33603</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0317" xml:lang="en">ADV-2009-0317</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7980" xml:lang="en">7980</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in bbcode.php in PHPbbBook 1.3 and 1.3h allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the l parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0443">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:elecard:elecard_avc_hd_player:5.5.90116"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:elecard:elecard_avc_hd_player:5.5.90116</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0443</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:22.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:48.980-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33089" xml:lang="en">33089</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7942" xml:lang="en">7942</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Elecard AVC HD PLAYER 5.5.90116 allows remote attackers to execute arbitrary code via an M3U file containing a long string in a URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0444">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sirini:grboard:1.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sirini:grboard:1.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0444</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:22.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.043-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33602" xml:lang="en">33602</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7979" xml:lang="en">7979</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in GRBoard 1.8, when register_globals is enabled and magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) theme parameter to (a) 179_squarebox_pds_list/view.php, (b) 179_squarebox_minishop_expand/view.php, (c) 179_squarebox_gallery_list_pds/view.php, (d) 179_squarebox_gallery_list/view.php, (e) 179_squarebox_gallery/view.php, (f) 179_squarebox_board_swfupload/view.php, (g) 179_squarebox_board_expand/view.php, (h) 179_squarebox_board_basic_with_grcode/view.php, (i) 179_squarebox_board_basic/view.php, (j) 179_simplebar_pds_list/view.php, (k) 179_simplebar_notice/view.php, (l) 179_simplebar_gallery_list_pds/view.php, (m) 179_simplebar_gallery/view.php, and (n) 179_simplebar_basic/view.php in theme/; the (2) path parameter to (o) latest/sirini_gallery_latest/list.php; and the (3) grboard parameter to (p) include.php and (q) form_mail.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0445">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dreampics:gallery_builder:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dreampics:gallery_builder:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0445</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.077-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.107-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33596" xml:lang="en">33596</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48468" xml:lang="en">dreampics-exhibitionid-sql-injection(48468)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7968" xml:lang="en">7968</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/9451" xml:lang="en">9451</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Dreampics Gallery Builder allows remote attackers to execute arbitrary SQL commands via the exhibition_id parameter in a gallery.viewPhotos action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0446">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:web-album:webalbum:2.4b"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:web-album:webalbum:2.4b</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0446</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.153-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33590" xml:lang="en">33590</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7961" xml:lang="en">7961</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in photo.php in WEBalbum 2.4b allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0447">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:aspindir:mydesign_sayac:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:aspindir:mydesign_sayac:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0447</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33593" xml:lang="en">33593</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7963" xml:lang="en">7963</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in default.asp in MyDesign Sayac 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the user parameter (aka UserName field) or (2) the pass parameter (aka Pass field) to (a) admin/admin.asp or (b) the default URI under admin/.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0448">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:syntax_desktop:syntax_desktop:2.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:syntax_desktop:syntax_desktop:2.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0448</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33601" xml:lang="en">33601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0319" xml:lang="en">ADV-2009-0319</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48496" xml:lang="en">syntax-desktop-preview-file-include(48496)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7977" xml:lang="en">7977</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in admin/modules/aa/preview.php in Syntax Desktop 2.7 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the synTarget parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0449">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:kaspersky_lab:kaspersky_anti-virus:6.0::workstations"/>
        <cpe-lang:fact-ref name="cpe:/a:kaspersky_lab:kaspersky_anti-virus:2008"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:kaspersky_lab:kaspersky_anti-virus:6.0::workstations</vuln:product>
      <vuln:product>cpe:/a:kaspersky_lab:kaspersky_anti-virus:2008</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0449</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:46.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip" xml:lang="en">http://kartoffel.reversemode.com/downloads/kaspersky_klim5_plugin.zip</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.reversemode.com/index.php?option=com_content&amp;task=view&amp;id=60&amp;Itemid=1" xml:lang="en">http://www.reversemode.com/index.php?option=com_content&amp;task=view&amp;id=60&amp;Itemid=1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500606/100/0/threaded" xml:lang="en">20090202 [Wintercore Research WS02-0209] Kaspersky Products Klim5.sys local privilege escalation</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33561" xml:lang="en">33561</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021661" xml:lang="en">1021661</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.wintercore.com/advisories/advisory_W020209.html" xml:lang="en">http://www.wintercore.com/advisories/advisory_W020209.html</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in klim5.sys in Kaspersky Anti-Virus for Workstations 6.0 and Anti-Virus 2008 allows local users to gain privileges via an IOCTL 0x80052110 call.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0450">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:blazevideo:hdtv_player:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:blazevideo:hdtv_player:3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:blazevideo:hdtv_player:2.1</vuln:product>
      <vuln:product>cpe:/a:blazevideo:hdtv_player:3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0450</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33588" xml:lang="en">33588</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48498" xml:lang="en">blazevideo-hdtv-plf-bo(48498)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7975" xml:lang="en">7975</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in BlazeVideo HDTV Player 3.5 and earlier allows remote attackers to execute arbitrary code via a long string in a playlist (aka .plf) file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0451">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:skalinks:skalinks:1.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:skalinks:skalinks:1.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0451</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33546" xml:lang="en">33546</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7932" xml:lang="en">7932</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in Skalfa SkaLinks 1.5 allows remote attackers to execute arbitrary SQL commands via the Admin name field to the default URI under admin/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0452">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:onlinegrades:online_grades:3.2.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:onlinegrades:online_grades:3.2.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0452</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.750-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33576" xml:lang="en">33576</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7956" xml:lang="en">7956</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in parents/login.php in Online Grades 3.2.4, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) uname or (2) pass parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0453">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:onlinegrades:online_grades:3.2.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:onlinegrades:online_grades:3.2.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0453</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7956" xml:lang="en">7956</vuln:reference>
    </vuln:references>
    <vuln:summary>Online Grades 3.2.4 allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0454">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dmxready:online_notebook_manager:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dmxready:online_notebook_manager:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0454</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33600" xml:lang="en">33600</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48503" xml:lang="en">onm-login-sql-injection(48503)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7970" xml:lang="en">7970</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in DMXReady Online Notebook Manager 1.1 allow remote attackers to execute arbitrary SQL commands via the (1) username or (2) password field.  NOTE: some third parties report inability to verify this issue.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0455">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:glfusion:glfusion:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:glfusion:glfusion:1.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:glfusion:glfusion:1.1.0</vuln:product>
      <vuln:product>cpe:/a:glfusion:glfusion:1.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0455</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.500-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortconsult.net/images/pdf/advisories/glFusion-xss-advisory.pdf" xml:lang="en">http://www.fortconsult.net/images/pdf/advisories/glFusion-xss-advisory.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.glfusion.org/article.php/xsscomments" xml:lang="en">http://www.glfusion.org/article.php/xsscomments</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33683" xml:lang="en">33683</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48603" xml:lang="en">glfusion-libcomment-xss(48603)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the anonymous comments feature in lib-comment.php in glFusion 1.1.0, 1.1.1, and earlier versions allows remote attackers to inject arbitrary web script or HTML via the username parameter to comment.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0456">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sourdough:sourdough:0.3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sourdough:sourdough:0.3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0456</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33569" xml:lang="en">33569</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7946" xml:lang="en">7946</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in examples/example_clientside_javascript.php in patForms, as used in Sourdough 0.3.5, allows remote attackers to execute arbitrary PHP code via a URL in the neededFiles[patForms] parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0457">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:magtrb:aja_portal:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:magtrb:aja_portal:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0457</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:23.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33565" xml:lang="en">33565</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7939" xml:lang="en">7939</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple directory traversal vulnerabilities in AJA Portal 1.2 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the currentlang parameter to admin/case.php in the (1) Contact_Plus and (2) Reviews modules, and (3) the module_name parameter to admin/includes/FANCYNLOptions.php in the Fancy_NewsLetter module.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0458">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wholehogsoftware:ware_support:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wholehogsoftware:ware_support:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0458</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33564" xml:lang="en">33564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7940" xml:lang="en">7940</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Ware Support 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field).  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0459">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wholehogsoftware:password_protect:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wholehogsoftware:password_protect:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0459</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.063-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.833-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33564" xml:lang="en">33564</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7941" xml:lang="en">7941</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in admin/login_submit.php in Whole Hog Password Protect: Enhanced 1.x allow remote attackers to execute arbitrary SQL commands via (1) the uid parameter (aka Username field) or (2) the pwd parameter (aka Password field).  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0460">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wholehogsoftware:ware_support:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wholehogsoftware:ware_support:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0460</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:17.940-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33577" xml:lang="en">33577</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7951" xml:lang="en">7951</vuln:reference>
    </vuln:references>
    <vuln:summary>Whole Hog Ware Support 1.x allows remote attackers to bypass authentication and obtain administrative access via an integer value in the adminid cookie.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0461">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wholehogsoftware:password_protect:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wholehogsoftware:password_protect:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0461</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:18.130-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33577" xml:lang="en">33577</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7952" xml:lang="en">7952</vuln:reference>
    </vuln:references>
    <vuln:summary>Whole Hog Password Protect: Enhanced 1.x allows remote attackers to bypass authentication and obtain administrative access via an integer value in the adminid cookie.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0462">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:clicktech:clickcart:6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:clicktech:clickcart:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0462</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.717-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33575" xml:lang="en">33575</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7953" xml:lang="en">7953</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in customer_login_check.asp in ClickTech ClickCart 6.0 allow remote attackers to execute arbitrary SQL commands via (1) the txtEmail parameter (aka E-MAIL field) or (2) the txtPassword parameter (aka password field) to customer_login.asp. NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0463">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:groonesworld:glinks:2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:groonesworld:glinks:2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0463</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33578" xml:lang="en">33578</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7954" xml:lang="en">7954</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in includes/header.php in Groone GLinks 2.1 allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0464">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:groonesworld:gbook:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:groonesworld:gbook:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0464</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.840-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33578" xml:lang="en">33578</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7955" xml:lang="en">7955</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in includes/header.php in Groone GBook 2.0 allows remote attackers to execute arbitrary PHP code via a URL in the abspath parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0465">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:synactis:all_in_the_box.ocx:3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:synactis:all_in_the_box.ocx:3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0465</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.887-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.dsecrg.com/pages/vul/show.php?id=62" xml:lang="en">http://www.dsecrg.com/pages/vul/show.php?id=62</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33535" xml:lang="en">33535</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0298" xml:lang="en">ADV-2009-0298</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7928" xml:lang="en">7928</vuln:reference>
    </vuln:references>
    <vuln:summary>The SaveDoc method in the All_In_The_Box.AllBox ActiveX control in ALL_IN_THE_BOX.OCX in Synactis ALL In-The-Box ActiveX 3 allows remote attackers to create and overwrite arbitrary files via an argument ending in a '\0' character, which bypasses the intended .box filename extension, as demonstrated by a C:\boot.ini\0 argument.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0466">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vivvo:vivvo:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vivvo:vivvo:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vivvo:vivvo:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vivvo:vivvo:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vivvo:vivvo:4.1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vivvo:vivvo:4.0.1</vuln:product>
      <vuln:product>cpe:/a:vivvo:vivvo:4.0.2</vuln:product>
      <vuln:product>cpe:/a:vivvo:vivvo:4.0.3</vuln:product>
      <vuln:product>cpe:/a:vivvo:vivvo:4.0.4</vuln:product>
      <vuln:product>cpe:/a:vivvo:vivvo:4.1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0466</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-06T01:49:50.377-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33582" xml:lang="en">33582</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vivvo.net/changelog.php" xml:lang="en">http://www.vivvo.net/changelog.php</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Vivvo CMS before 4.1.1 allows remote attackers to inject arbitrary web script or HTML via a URI that triggers a 404 Page Not Found response.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0467">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:armorlogic:profense_web_application_firewall:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:armorlogic:profense_web_application_firewall:2.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:armorlogic:profense_web_application_firewall:2.6.2</vuln:product>
      <vuln:product>cpe:/a:armorlogic:profense_web_application_firewall:2.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0467</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.670-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:49.950-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33523" xml:lang="en">33523</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7919" xml:lang="en">7919</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in proxy.html in Profense Web Application Firewall 2.6.2 and 2.6.3 allows remote attackers to inject arbitrary web script or HTML via the proxy parameter in a deny_log manage action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0468">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:armorlogic:profense_web_application_firewall:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:armorlogic:profense_web_application_firewall:2.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:armorlogic:profense_web_application_firewall:2.6.2</vuln:product>
      <vuln:product>cpe:/a:armorlogic:profense_web_application_firewall:2.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0468</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.767-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.013-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33523" xml:lang="en">33523</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7919" xml:lang="en">7919</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site request forgery (CSRF) vulnerabilities in ajax.html in Profense Web Application Firewall 2.6.2 and 2.6.3 allow remote attackers to hijack the authentication of administrators for requests that (1) shutdown the server, (2) send ping packets, (3) enable network services, (4) configure a proxy server, and (5) modify other settings via parameters in the query string.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0469">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:futomis_cgi_cafe:fulltext_search_cgi:1.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:futomis_cgi_cafe:fulltext_search_cgi:1.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0469</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T02:00:24.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-13T01:47:00.953-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN80771386/index.html" xml:lang="en">JVN#80771386</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000008.html" xml:lang="en">JVNDB-2009-000008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.futomi.com/library/info/2009/20090123.html" xml:lang="en">http://www.futomi.com/library/info/2009/20090123.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33409" xml:lang="en">33409</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in futomi's CGI Cafe Fulltext search CGI 1.1.2 allows remote attackers to gain administrative privileges via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0470">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2823%29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4%2823%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0470</vuln:cve-id>
    <vuln:published-datetime>2009-02-06T14:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:47.040-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500674/100/0/threaded" xml:lang="en">20090204 Cisco IOS XSS/CSRF Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33625" xml:lang="en">33625</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the HTTP server in Cisco IOS 12.4(23) allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) level/15/exec/-/ or (2) exec/, a different vulnerability than CVE-2008-3821.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0471">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2823%29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4%2823%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0471</vuln:cve-id>
    <vuln:published-datetime>2009-02-06T14:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:47.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500674/100/0/threaded" xml:lang="en">20090204 Cisco IOS XSS/CSRF Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in the HTTP server in Cisco IOS 12.4(23) allows remote attackers to execute arbitrary commands, as demonstrated by executing the hostname command with a level/15/configure/-/hostname request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0472">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0472</vuln:cve-id>
    <vuln:published-datetime>2009-02-06T14:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:33.470-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729" xml:lang="en">http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/882619" xml:lang="en">VU#882619</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33638" xml:lang="en">33638</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0347" xml:lang="en">ADV-2009-0347</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0473">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0473</vuln:cve-id>
    <vuln:published-datetime>2009-02-06T14:30:00.593-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:33.563-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-59"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729" xml:lang="en">http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/619499" xml:lang="en">VU#619499</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33636" xml:lang="en">33636</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0347" xml:lang="en">ADV-2009-0347</vuln:reference>
    </vuln:references>
    <vuln:summary>Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0474">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rockwellautomation:controllogix_1756-enbt%2fa_ethernet%2f_ip_bridge:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0474</vuln:cve-id>
    <vuln:published-datetime>2009-02-06T14:30:00.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:33.673-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729" xml:lang="en">http://rockwellautomation.custhelp.com/cgi-bin/rockwellautomation.cfg/php/enduser/std_adp.php?p_faqid=57729</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/124059" xml:lang="en">VU#124059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/RGII-7MWKZ3" xml:lang="en">http://www.kb.cert.org/vuls/id/RGII-7MWKZ3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0347" xml:lang="en">ADV-2009-0347</vuln:reference>
    </vuln:references>
    <vuln:summary>The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to obtain "internal web page information" and "internal information about the module" via unspecified vectors.  NOTE: this may overlap CVE-2002-1603.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0475">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:android:opencore:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:android:opencore:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0475</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:47.917-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://android.git.kernel.org/?p=platform/external/opencore.git;a=commit;h=7b466cd0ecfdba72c4cbd0f3a8c2001141376b0f" xml:lang="en">http://android.git.kernel.org/?p=platform/external/opencore.git;a=commit;h=7b466cd0ecfdba72c4cbd0f3a8c2001141376b0f</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://review.source.android.com/Gerrit#change,8815" xml:lang="en">http://review.source.android.com/Gerrit#change,8815</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2009-002.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2009-002.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500750/100/0/threaded" xml:lang="en">20090207 [oCERT-2009-002] OpenCORE insufficient bounds checking during MP3 decoding</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33673" xml:lang="en">33673</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer underflow in the Huffman decoding functionality (pvmp3_huffman_parsing.cpp) in OpenCORE 2.0 and earlier allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a crafted MP3 file that triggers heap corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0476">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:multimediasoft:audio_dj_studio_for_.net:-"/>
        <cpe-lang:fact-ref name="cpe:/a:multimediasoft:audio_sound_editer_for_.net:-"/>
        <cpe-lang:fact-ref name="cpe:/a:multimediasoft:audio_sound_recorder_for_.net:-"/>
        <cpe-lang:fact-ref name="cpe:/a:multimediasoft:audio_sound_studio_for_.net:-"/>
        <cpe-lang:fact-ref name="cpe:/a:multimediasoft:audio_sound_suite_for_.net:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:multimediasoft:audio_dj_studio_for_.net:-</vuln:product>
      <vuln:product>cpe:/a:multimediasoft:audio_sound_editer_for_.net:-</vuln:product>
      <vuln:product>cpe:/a:multimediasoft:audio_sound_recorder_for_.net:-</vuln:product>
      <vuln:product>cpe:/a:multimediasoft:audio_sound_studio_for_.net:-</vuln:product>
      <vuln:product>cpe:/a:multimediasoft:audio_sound_suite_for_.net:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0476</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T16:30:09.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:48.540-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500652/100/0/threaded" xml:lang="en">20090203 Euphonics Audio Player v1.0 (.pls) Local BOF POC</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33589" xml:lang="en">33589</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0316" xml:lang="en">ADV-2009-0316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7958" xml:lang="en">7958</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7973" xml:lang="en">7973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7974" xml:lang="en">7974</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in MultiMedia Soft AdjMmsEng.dll 7.11.1.0 and 7.11.2.7, as distributed in multiple MultiMedia Soft audio components for .NET, allows remote attackers to execute arbitrary code via a long string in a playlist (.pls) file, as originally reported for Euphonics Audio Player 1.0.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0477">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0477</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T16:30:09.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:33.987-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-244026-1" xml:lang="en">244026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ioactive.com/pdfs/OpenSolarisUPtrDeref.pdf" xml:lang="en">http://www.ioactive.com/pdfs/OpenSolarisUPtrDeref.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33654" xml:lang="en">33654</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0352" xml:lang="en">ADV-2009-0352</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the process (aka proc) filesystem in Sun OpenSolaris snv_85 through snv_100 allows local users to gain privileges via vectors related to the contract filesystem.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0478">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:2.7.stable1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:2.7.stable2"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:2.7.stable3"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:2.7.stable4"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:2.7.stable5"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable2"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable3"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable4"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable5"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable6"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable7"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable8"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable9"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable10"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable11"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.0.stable12"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid:3.1.0.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:squid:squid:2.7.stable1</vuln:product>
      <vuln:product>cpe:/a:squid:squid:2.7.stable2</vuln:product>
      <vuln:product>cpe:/a:squid:squid:2.7.stable3</vuln:product>
      <vuln:product>cpe:/a:squid:squid:2.7.stable4</vuln:product>
      <vuln:product>cpe:/a:squid:squid:2.7.stable5</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable1</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable2</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable3</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable4</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable5</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable6</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable7</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable8</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable9</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable10</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable11</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.0.stable12</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.1</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.1.0.1</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.1.0.2</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.1.0.3</vuln:product>
      <vuln:product>cpe:/a:squid:squid:3.1.0.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0478</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T17:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:49.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-38.xml" xml:lang="en">GLSA-200903-38</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:034" xml:lang="en">MDVSA-2009:034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500653/100/0/threaded" xml:lang="en">20090204 Squid Proxy Cache Denial of Service in request handling</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33604" xml:lang="en">33604</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021684" xml:lang="en">1021684</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.squid-cache.org/Advisories/SQUID-2009_1.txt" xml:lang="en">http://www.squid-cache.org/Advisories/SQUID-2009_1.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch" xml:lang="en">http://www.squid-cache.org/Versions/v2/2.7/changesets/12432.patch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=484246" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=484246</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8021" xml:lang="en">8021</vuln:reference>
    </vuln:references>
    <vuln:summary>Squid 2.7 to 2.7.STABLE5, 3.0 to 3.0.STABLE12, and 3.1 to 3.1.0.4 allows remote attackers to cause a denial of service via an HTTP request with an invalid version number, which triggers a reachable assertion in (1) HttpMsg.c and (2) HttpStatusLine.c.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0479">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:onlinegrades:online_grades:3.2.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:onlinegrades:online_grades:3.2.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0479</vuln:cve-id>
    <vuln:published-datetime>2009-02-08T20:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-09T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-09T15:17:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:summary>Multiple SQL injection vulnerabilities in admin/admin_login.php in Online Grades 3.2.4 allow remote attackers to execute arbitrary SQL commands via the (1) uname or (2) pword parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0480">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:8::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:9::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0480</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T11:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6038" name="oval:org.mitre.oval:def:6038"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021653" xml:lang="en">1021653</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-116965-34-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-116965-34-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-248026-1" xml:lang="en">248026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-042.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-042.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33550" xml:lang="en">33550</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0364" xml:lang="en">ADV-2009-0364</vuln:reference>
    </vuln:references>
    <vuln:summary>The IP implementation in Sun Solaris 8 through 10, and OpenSolaris before snv_82, uses an improper arena when allocating minor numbers for sockets, which allows local users to cause a denial of service (32-bit application failure and login outage) by opening a large number of sockets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0481">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16_rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0481</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:24.907-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/2.22.6/" xml:lang="en">http://www.bugzilla.org/security/2.22.6/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33580" xml:lang="en">33580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Bugzilla 2.x before 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote authenticated users to conduct cross-site scripting (XSS) and related attacks by uploading HTML and JavaScript attachments that are rendered by web browsers.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0482">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16_rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0482</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:25.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/2.22.6/" xml:lang="en">http://www.bugzilla.org/security/2.22.6/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33580" xml:lang="en">33580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Bugzilla before 3.2 before 3.2.1, 3.3 before 3.3.2, and other versions before 3.2 allows remote attackers to perform bug updating activities as other users via a link or IMG tag to process_bug.cgi.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0483">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.14.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.16_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.14.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.16_rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0483</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:25.280-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/2.22.6/" xml:lang="en">http://www.bugzilla.org/security/2.22.6/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33580" xml:lang="en">33580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=466692" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=466692</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=472362" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=472362</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Bugzilla 2.22 before 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete keywords and user preferences via a link or IMG tag to (1) editkeywords.cgi or (2) userprefs.cgi.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0484">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0484</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:25.407-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/2.22.6/" xml:lang="en">http://www.bugzilla.org/security/2.22.6/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33580" xml:lang="en">33580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=466748" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=466748</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Bugzilla 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete shared or saved searches via a link or IMG tag to buglist.cgi.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0485">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.17.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.18.6%2b"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.19.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.20.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.21.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:2.22.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.17.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.18.6%2b</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.19.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.20.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.21.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:2.22.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0485</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:25.593-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/2.22.6/" xml:lang="en">http://www.bugzilla.org/security/2.22.6/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33580" xml:lang="en">33580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=466692" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=466692</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in Bugzilla 2.17 to 2.22.7, 3.0 before 3.0.7, 3.2 before 3.2.1, and 3.3 before 3.3.2 allows remote attackers to delete unused flag types via a link or IMG tag to editflagtypes.cgi.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0486">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:bugzilla:3.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.2.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:bugzilla:3.3.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0486</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T12:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-25T01:50:25.717-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.bugzilla.org/security/3.0.7/" xml:lang="en">http://www.bugzilla.org/security/3.0.7/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33581" xml:lang="en">33581</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00664.html" xml:lang="en">FEDORA-2009-2418</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00687.html" xml:lang="en">FEDORA-2009-2417</vuln:reference>
    </vuln:references>
    <vuln:summary>Bugzilla 3.2.1, 3.0.7, and 3.3.2, when running under mod_perl, calls the srand function at startup time, which causes Apache children to have the same seed and produce insufficiently random numbers for random tokens, which allows remote attackers to bypass cross-site request forgery (CSRF) protection mechanisms and conduct unauthorized activities as other users.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0487">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:0.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mahara:mahara:0.9.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:0.9.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:0.9.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0487</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T15:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.580-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=198" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=198</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33619" xml:lang="en">33619</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48518" xml:lang="en">mahara-unspecified-xss(48518)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Mahara before 1.0.9 allows remote attackers to inject arbitrary web script or HTML via a crafted forum post.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0488">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1.1_pre"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1.1_rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.3a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.3b"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.3.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.3.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.3.2b3"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:3.4.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:4.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.0_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.1_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.2_alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.3_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.4_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.4a_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.5_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.6_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.7_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.7a_beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.8_rc"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.13a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.14a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.15a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.17a"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:phorum:phorum:5.2.10:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phorum:phorum:3.0.7</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1.1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1.1_pre</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1.1_rc2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1.1a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.1.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.3</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.3a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.3b</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.4</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.5</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.6</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.7</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.2.8</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.3.1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.3.1a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.3.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.3.2a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.3.2b3</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.3</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.4</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.5</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.6</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.7</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.8</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:3.4.8a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:4.3.7</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.0_alpha</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.1_alpha</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.2_alpha</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.3_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.4_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.4a_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.5_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.6_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.7_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.7a_beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.8_rc</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.9</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.10</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.11</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.12</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.13</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.13a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.14</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.14a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.15</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.15a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.16</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.17</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.17a</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.18</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.19</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.0.20</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.13</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.14</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.17</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.18</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.20</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.21</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.1.25</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.2:beta</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.3:rc1</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.4:rc2</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.5</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.8</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.9</vuln:product>
      <vuln:product>cpe:/a:phorum:phorum:5.2.10:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0488</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T15:30:02.750-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-17T01:57:28.110-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.phorum.org/phorum5/read.php?64,136129" xml:lang="en">http://www.phorum.org/phorum5/read.php?64,136129</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33657" xml:lang="en">33657</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Phorum before 5.2.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0489">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:david_paleino:wicd:1.5.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:david_paleino:wicd:1.2.7</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.3.1</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.4.0</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.4.1</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.4.2</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.0</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.1</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.2</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.3</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.4</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.5</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.6</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.7</vuln:product>
      <vuln:product>cpe:/a:david_paleino:wicd:1.5.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0489</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T15:30:02.767-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-07-02T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-10T10:31:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bazaar.launchpad.net/~wicd-devel/wicd/trunk/revision/222" xml:lang="en">http://bazaar.launchpad.net/~wicd-devel/wicd/trunk/revision/222</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-12.xml" xml:lang="en">GLSA-200904-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?group_id=194573&amp;release_id=659059" xml:lang="en">http://sourceforge.net/project/shownotes.php?group_id=194573&amp;release_id=659059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/06/4" xml:lang="en">[oss-security] 20090206 CVE Request - Wicd &lt;= 1.5.8</vuln:reference>
    </vuln:references>
    <vuln:summary>The DBus configuration file for Wicd before 1.5.9 allows arbitrary users to own org.wicd.daemon, which allows local users to receive messages that were intended for the Wicd daemon, possibly including credentials.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0490">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:audacity:audacity:1.3.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:audacity:audacity:1.2.6</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.0</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.1</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.3</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.4</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.5</vuln:product>
      <vuln:product>cpe:/a:audacity:audacity:1.3.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0490</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-08-13T17:47:32.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=253493" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=253493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" xml:lang="en">SUSE-SR:2009:004</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://n2.nabble.com/Audacity-%22String_parse::get_nonspace_quoted()%22-Buffer-Overflow-td2139537.html" xml:lang="en">[audacity-devel] 20090110 Audacity "String_parse::get_nonspace_quoted()" Buffer Overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33090" xml:lang="en">33090</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0008" xml:lang="en">ADV-2009-0008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7634" xml:lang="en">7634</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the String_parse::get_nonspace_quoted function in lib-src/allegro/strparse.cpp in Audacity 1.2.6 and other versions before 1.3.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a .gro file containing a long string.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0491">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:elecard:elecard_mpeg_player:5.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:elecard:elecard_mpeg_player:5.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0491</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0007" xml:lang="en">ADV-2009-0007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7637" xml:lang="en">7637</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Elecard MPEG Player 5.5 build 15884.081218 allows remote attackers to execute arbitrary code via a M3U file containing a long URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0492">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:simpleircbot:simpleircbot:1.0:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:simpleircbot:simpleircbot:1.0:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0492</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:35.657-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?group_id=249202&amp;release_id=650796" xml:lang="en">http://sourceforge.net/project/shownotes.php?group_id=249202&amp;release_id=650796</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33127" xml:lang="en">33127</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0020" xml:lang="en">ADV-2009-0020</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in SimpleIrcBot before 1.0 Stable has unknown impact and attack vectors related to an "auth vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0493">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:martin_unzner:it%21cms:0.21-alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:martin_unzner:it%21cms:0.21-alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0493</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.433-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33139" xml:lang="en">33139</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47791" xml:lang="en">itcms-login-sql-injection(47791)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7686" xml:lang="en">7686</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in IT!CMS 2.1a and earlier allows remote attackers to execute arbitrary SQL commands via the Username.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0494">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mivaco:com_portfol:1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mivaco:com_portfol:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0494</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33218" xml:lang="en">33218</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7734" xml:lang="en">7734</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Portfol (com_portfol) 1.2 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the vcatid parameter in a viewcategory action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0495">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:it747:realtor_747:4.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:it747:realtor_747:4.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0495</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33227" xml:lang="en">33227</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7743" xml:lang="en">7743</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in include/define.php in REALTOR 747 4.11 allows remote attackers to execute arbitrary PHP code via a URL in the INC_DIR parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0496">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ignite_realtime:openfire:3.6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ignite_realtime:openfire:3.6.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0496</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:50.650-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/openfire-multiple-vulnerabilities" xml:lang="en">http://www.coresecurity.com/content/openfire-multiple-vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.igniterealtime.org/issues/browse/JM-1506" xml:lang="en">http://www.igniterealtime.org/issues/browse/JM-1506</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499880/100/0/threaded" xml:lang="en">20090108 CORE-2008-1128: Openfire multiple vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32935" xml:lang="en">32935</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32937" xml:lang="en">32937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32938" xml:lang="en">32938</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32939" xml:lang="en">32939</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32940" xml:lang="en">32940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32943" xml:lang="en">32943</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32944" xml:lang="en">32944</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.gentoo.org/show_bug.cgi?id=254309" xml:lang="en">https://bugs.gentoo.org/show_bug.cgi?id=254309</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47834" xml:lang="en">openfire-multiple-scripts-xss(47834)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47835" xml:lang="en">openfire-serverproperties-xss(47835)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47845" xml:lang="en">openfire-mucroomeditform-xss(47845)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Ignite Realtime Openfire 3.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) log parameter to (a) logviewer.jsp and (b) log.jsp; (2) search parameter to (c) group-summary.jsp; (3) username parameter to (d) user-properties.jsp; (4) logDir, (5) maxTotalSize, (6) maxFileSize, (7) maxDays, and (8) logTimeout parameters to (e) audit-policy.jsp; (9) propName parameter to (f) server-properties.jsp; and the (10) roomconfig_roomname and (11) roomconfig_roomdesc parameters to (g) muc-room-edit-form.jsp.  NOTE: this can be leveraged for arbitrary code execution by using XSS to upload a malicious plugin.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0497">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:igniterealtime:openfire:3.6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:igniterealtime:openfire:3.6.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0497</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:52.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://svn.igniterealtime.org/svn/repos/openfire/trunk/src/web/log.jsp" xml:lang="en">http://svn.igniterealtime.org/svn/repos/openfire/trunk/src/web/log.jsp</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/openfire-multiple-vulnerabilities" xml:lang="en">http://www.coresecurity.com/content/openfire-multiple-vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499880/100/0/threaded" xml:lang="en">20090108 CORE-2008-1128: Openfire multiple vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32945" xml:lang="en">32945</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugs.gentoo.org/show_bug.cgi?id=257585" xml:lang="en">https://bugs.gentoo.org/show_bug.cgi?id=257585</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47806" xml:lang="en">openfire-log-directory-traversal(47806)</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in log.jsp in Ignite Realtime Openfire 3.6.2 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the log parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0498">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:minitdesign:virtual_guestbook:2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:minitdesign:virtual_guestbook:2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0498</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T20:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7744" xml:lang="en">7744</vuln:reference>
    </vuln:references>
    <vuln:summary>Virtual GuestBook (vgbook) 2.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database file via a direct request to guestbook.mdb.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0499">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moodle:moodle:1.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0499</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T21:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-01T01:42:34.890-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvs.moodle.org/moodle/mod/forum/post.php?r1=1.154.2.14&amp;r2=1.154.2.15" xml:lang="en">http://cvs.moodle.org/moodle/mod/forum/post.php?r1=1.154.2.14&amp;r2=1.154.2.15</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moodle.org/security/" xml:lang="en">http://moodle.org/security/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/04/1" xml:lang="en">[oss-security] 20090204 CVS request - Moodle</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site request forgery (CSRF) vulnerability in the forum code in Moodle 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to delete unauthorized forum posts via a link or IMG tag to post.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0500">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moodle:moodle:1.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.6.8</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0500</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T21:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-09-12T23:00:25.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moodle.org/security/" xml:lang="en">http://moodle.org/security/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1724" xml:lang="en">DSA-1724</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/04/1" xml:lang="en">[oss-security] 20090204 CVS request - Moodle</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in course/lib.php in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4 allows remote attackers to inject arbitrary web script or HTML via crafted log table information that is not properly handled when it is displayed in a log report.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0501">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moodle:moodle:1.8</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0501</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T21:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-01T01:42:35.110-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moodle.org/security/" xml:lang="en">http://moodle.org/security/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/04/1" xml:lang="en">[oss-security] 20090204 CVS request - Moodle</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Calendar export feature in Moodle 1.8 before 1.8.8 and 1.9 before 1.9.4 allows attackers to obtain sensitive information and conduct "brute force attacks on user accounts" via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0502">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:snoopy:snoopy:1.2.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.3"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.4"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.5"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.7.6"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.1"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.2"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.3"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.4"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.5"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.6"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.8.7"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.1"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.2"/>
          <cpe-lang:fact-ref name="cpe:/a:moodle:moodle:1.9.3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:moodle:moodle:1.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.7.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.3</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.4</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.5</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.6</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.8.7</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.1</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.2</vuln:product>
      <vuln:product>cpe:/a:moodle:moodle:1.9.3</vuln:product>
      <vuln:product>cpe:/a:snoopy:snoopy:1.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0502</vuln:cve-id>
    <vuln:published-datetime>2009-02-09T21:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-09-12T23:00:25.377-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://moodle.org/security/" xml:lang="en">http://moodle.org/security/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1724" xml:lang="en">DSA-1724</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/04/1" xml:lang="en">[oss-security] 20090204 CVS request - Moodle</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in blocks/html/block_html.php in Snoopy 1.2.3, as used in Moodle 1.6 before 1.6.9, 1.7 before 1.7.7, 1.8 before 1.8.8, and 1.9 before 1.9.4, allows remote attackers to inject arbitrary web script or HTML via an HTML block, which is not properly handled when the "Login as" feature is used to visit a MyMoodle or Blog page.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0503">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_message_broker:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_message_broker:6.1.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_message_broker:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_message_broker:6.1.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0503</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.703-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.813-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33819" xml:lang="en">33819</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021735" xml:lang="en">1021735</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0460" xml:lang="en">ADV-2009-0460</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=849&amp;uid=swg27011431" xml:lang="en">http://www-01.ibm.com/support/docview.wss?rs=849&amp;uid=swg27011431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1IC55298" xml:lang="en">IC55298</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48642" xml:lang="en">websphere-msgbroker-info-disclosure(48642)</vuln:reference>
    </vuln:references>
    <vuln:summary>IBM WebSphere Message Broker 6.1.x before 6.1.0.2 writes a database connection password to the Event Log and System Log during exception handling for a JDBC error, which allows local users to obtain sensitive information by reading these logs.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0504">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0504</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.860-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27014463" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27014463</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1PK73573" xml:lang="en">PK73573</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48700" xml:lang="en">websphere-wspolicy-information-disclosure(48700)</vuln:reference>
    </vuln:references>
    <vuln:summary>WSPolicy in the Web Services component in IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.1 does not properly recognize the IDAssertion.isUsed binding property, which allows local users to discover a password by reading a SOAP message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0505">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:aix"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:ga"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:hp-ia"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:hp-ux"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:solaris"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:txseries:6.2:-:windows"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:aix</vuln:product>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:ga</vuln:product>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:hp-ia</vuln:product>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:hp-ux</vuln:product>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:solaris</vuln:product>
      <vuln:product>cpe:/a:ibm:txseries:6.2:-:windows</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0505</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T11:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.907-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33883" xml:lang="en">33883</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0911" xml:lang="en">ADV-2009-0911</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg24019725" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg24019725</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48885" xml:lang="en">txseries-forcepurge-wait-unspecified(48885)</vuln:reference>
    </vuln:references>
    <vuln:summary>The CICS listener in IBM TXSeries for Multiplatforms 6.2 GA waits for a forcepurge acknowledgement from the CICS Application Server (CICSAS) after an eci response timeout, which might allow remote authenticated users to cause a denial of service (forcepurge handling delay), or have unspecified other impact, via vectors involving slow or nonexistent acknowledgement.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0506">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.4"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.6"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.8"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.10"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.12"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.14"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.16"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.18"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.20"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.22"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.24"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:ibm:z%2fos"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.22</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.24</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0506</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T11:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:57.970-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33884" xml:lang="en">33884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006876" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006876</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48886" xml:lang="en">websphere-zos-csiv2-unspecified(48886)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in IBM WebSphere Application Server (WAS) 5.1 and 6.0.2 before 6.0.2.33 on z/OS, when CSIv2 Identity Assertion is enabled and Enterprise JavaBeans (EJB) interaction occurs between a WAS 6.1 instance and a WAS pre-6.1 instance, allows local users to have an unknown impact via vectors related to (1) use of the wrong subject and (2) multiple CBIND checks.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0507">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_process_server:6.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_process_server:6.1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_process_server:6.1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_process_server:6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_process_server:6.1.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_process_server:6.1.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_process_server:6.1.2.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_process_server:6.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0507</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.017-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0670" xml:lang="en">ADV-2009-0670</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27015580" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27015580</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-1.ibm.com/support/docview.wss?uid=swg1JR30088" xml:lang="en">JR30088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48892" xml:lang="en">websphere-process-server-info-disclosure(48892)</vuln:reference>
    </vuln:references>
    <vuln:summary>IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0508">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:5.1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.31"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.0.2.33"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:7.0.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:5.1.1.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.23</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.25</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.27</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.29</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.31</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.0.2.33</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:7.0.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0508</vuln:cve-id>
    <vuln:published-datetime>2009-03-16T15:30:00.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.080-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34104" xml:lang="en">34104</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0704" xml:lang="en">ADV-2009-0704</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1188" xml:lang="en">ADV-2009-1188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1464" xml:lang="en">ADV-2009-1464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?rs=180&amp;uid=swg24022456" xml:lang="en">http://www-01.ibm.com/support/docview.wss?rs=180&amp;uid=swg24022456</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21380233" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21380233</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21380376" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21380376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006876" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006876</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49085" xml:lang="en">websphere-web-app-information-disclosure(49085)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Servlet Engine/Web Container and JSP components in IBM WebSphere Application Server (WAS) 5.1.0, 5.1.1.19, 6.0.2 before 6.0.2.35, 6.1 before 6.1.0.23, and 7.0 before 7.0.0.3 allow remote attackers to read arbitrary files contained in war files in (1) web-inf, (2) meta-inf, and unspecified other directories via unknown vectors, related to (a) web-based applications and (b) the administrative console.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0509">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::elements"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:security_update:professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2:security_update"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::elements</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:security_update:professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2:security_update</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0509</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T11:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.157-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html" xml:lang="en">SUSE-SA:2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-06.xml" xml:lang="en">GLSA-200907-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022361" xml:lang="en">1022361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-07.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1109.html" xml:lang="en">RHSA-2009:1109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35274" xml:lang="en">35274</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-161A.html" xml:lang="en">TA09-161A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1547" xml:lang="en">ADV-2009-1547</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49239" xml:lang="en">reader-text-bo(49239)</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 allows remote attackers to execute arbitrary code via a crafted file that triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0510">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::elements"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:security_update:professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2:security_update"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::elements</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:security_update:professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2:security_update</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0510</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T11:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-05-04T01:40:56.937-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html" xml:lang="en">SUSE-SA:2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-06.xml" xml:lang="en">GLSA-200907-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022361" xml:lang="en">1022361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-07.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1109.html" xml:lang="en">RHSA-2009:1109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35274" xml:lang="en">35274</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-161A.html" xml:lang="en">TA09-161A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1547" xml:lang="en">ADV-2009-1547</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0511, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0511">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::elements"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:security_update:professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2:security_update"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::elements</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:security_update:professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2:security_update</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0511</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T11:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-05-04T01:40:57.077-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html" xml:lang="en">SUSE-SA:2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-06.xml" xml:lang="en">GLSA-200907-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022361" xml:lang="en">1022361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-07.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1109.html" xml:lang="en">RHSA-2009:1109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35274" xml:lang="en">35274</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-161A.html" xml:lang="en">TA09-161A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1547" xml:lang="en">ADV-2009-1547</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0512, CVE-2009-0888, and CVE-2009-0889.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0512">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::elements"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:security_update:professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.1::standard"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2:security_update"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::elements</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:security_update:professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::professional</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.1::standard</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2:security_update</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0512</vuln:cve-id>
    <vuln:published-datetime>2009-06-11T11:30:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-05-04T01:40:57.203-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00000.html" xml:lang="en">SUSE-SA:2009:035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-06.xml" xml:lang="en">GLSA-200907-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022361" xml:lang="en">1022361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-07.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1109.html" xml:lang="en">RHSA-2009:1109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35274" xml:lang="en">35274</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35293" xml:lang="en">35293</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-161A.html" xml:lang="en">TA09-161A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1547" xml:lang="en">ADV-2009-1547</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the JBIG2 filter in Adobe Reader 7 and Acrobat 7 before 7.1.3, Adobe Reader 8 and Acrobat 8 before 8.1.6, and Adobe Reader 9 and Acrobat 9 before 9.1.2 might allow remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2009-0510, CVE-2009-0511, CVE-2009-0888, and CVE-2009-0889.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0513">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:webframe:webframe:0.76"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:webframe:webframe:0.76</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0513</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.667-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33701" xml:lang="en">33701</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8025" xml:lang="en">8025</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in WebFrame 0.76 allow remote attackers to execute arbitrary PHP code via a URL in the classFiles parameter to (1) admin/doc/index.php, (2) index.php, and (3) base/menu.php in mod/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0514">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:webframe:webframe:0.76"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:webframe:webframe:0.76</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0514</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.730-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33701" xml:lang="en">33701</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8025" xml:lang="en">8025</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple directory traversal vulnerabilities in WebFrame 0.76 allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the (1) currentmod and (2) LANG parameters to mod/index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0515">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:yanocc:yanocc:0.1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:yanocc:yanocc:0.1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0515</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.777-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33704" xml:lang="en">33704</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0383" xml:lang="en">ADV-2009-0383</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48608" xml:lang="en">yanocc-checklang-file-include(48608)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8020" xml:lang="en">8020</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in check_lang.php in Yet Another NOCC (YANOCC) 0.1.0 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the lang parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0516">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:businessspace:businessspace:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:businessspace:businessspace:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0516</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:02.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:52.823-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500787/100/0/threaded" xml:lang="en">20090209 [ECHO_ADV_102$2009] BusinessSpace &lt;= 1.2 (id) Remote SQL Injection Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33692" xml:lang="en">33692</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48606" xml:lang="en">businessspace-index-sql-injection(48606)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8011" xml:lang="en">8011</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the classified page (classified.php) in BusinessSpace 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0517">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.5.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:0.61"/>
        <cpe-lang:fact-ref name="cpe:/a:phpslash:phpslash:065"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpslash:phpslash</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.5.3.2</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.6</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.6.1</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.6.2</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.7.1</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.7.2</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.8.0</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.8.1</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.8.1.1</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:0.61</vuln:product>
      <vuln:product>cpe:/a:phpslash:phpslash:065</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0517</vuln:cve-id>
    <vuln:published-datetime>2009-02-10T19:30:03.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:53.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500664/100/0/threaded" xml:lang="en">20090201 phpslash &lt;= 0.8.1.1 Remote Code Execution Exploit</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33572" xml:lang="en">33572</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48441" xml:lang="en">phpslash-generic-code-execution(48441)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7948" xml:lang="en">7948</vuln:reference>
    </vuln:references>
    <vuln:summary>Eval injection vulnerability in index.php in phpSlash 0.8.1.1 and earlier allows remote attackers to execute arbitrary PHP code via the fields parameter, which is supplied to an eval function call within the generic function in include/class/tz_env.class.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0518">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_esx:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_esxi:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:vmware:vmware_virtualcenter:1.4.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vmware:vmware_esx:3.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_esxi:3.5</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.2</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.3</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.3.1</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.4</vuln:product>
      <vuln:product>cpe:/a:vmware:vmware_virtualcenter:1.4.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0518</vuln:cve-id>
    <vuln:published-datetime>2009-04-06T11:30:04.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:50.967-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6376" name="oval:org.mitre.oval:def:6376"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000054.html" xml:lang="en">[security-announce] 20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://seclists.org/fulldisclosure/2009/Apr/0036.html" xml:lang="en">20090403 VMSA-2009-0005 VMware Hosted products, VI Client and patches for ESX and ESXi resolve multiple security issues</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34373" xml:lang="en">34373</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0005.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0005.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0944" xml:lang="en">ADV-2009-0944</vuln:reference>
    </vuln:references>
    <vuln:summary>VI Client in VMware VirtualCenter before 2.5 Update 4, VMware ESXi 3.5 before Update 4, and VMware ESX 3.5 before Update 4 retains the VirtualCenter Server password in process memory, which might allow local users to obtain this password.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0519">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:air:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.69.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.70.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::basic"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.24.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.34.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.35.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.39.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.31.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.45.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.47.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.48.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.112.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.114.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.115.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.124.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.0.584"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.10"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.36"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs3::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs4::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flex:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:air:1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.25</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63::linux</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.69.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.70.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.2</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::basic</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.24.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.34.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.35.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.39.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.16</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.31.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.45.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.47.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.48.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.112.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.114.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.115.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.124.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.0.584</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.10</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.36</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs3::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs4::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.15.3</vuln:product>
      <vuln:product>cpe:/a:adobe:flex:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0519</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.043-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15837" name="oval:org.mitre.oval:def:15837"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6470" name="oval:org.mitre.oval:def:6470"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5929" xml:lang="en">http://isc.sans.org/diary.html?storyid=5929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0332.html" xml:lang="en">RHSA-2009:0332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0334.html" xml:lang="en">RHSA-2009:0334</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-23.xml" xml:lang="en">GLSA-200903-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1" xml:lang="en">254909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-01.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33890" xml:lang="en">33890</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0513" xml:lang="en">ADV-2009-0513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0743" xml:lang="en">ADV-2009-0743</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487141" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487141</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48900" xml:lang="en">flash-swf-unspecified-dos(48900)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 allows remote attackers to cause a denial of service (browser crash) or possibly execute arbitrary code via a crafted Shockwave Flash (aka .swf) file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0520">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:air:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.25"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.69.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.70.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::basic"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.24.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.34.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.35.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.39.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.31.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.45.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.47.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.48.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.112.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.114.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.115.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.124.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.0.584"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.10"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.36"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs3::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs4::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.15.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:flex:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:air:1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.25</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63::linux</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.69.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.70.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.2</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::basic</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.24.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.34.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.35.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.39.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.16</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.31.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.45.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.47.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.48.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.112.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.114.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.115.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.124.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.0.584</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.10</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.36</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs3::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs4::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.15.3</vuln:product>
      <vuln:product>cpe:/a:adobe:flex:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0520</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.137-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16057" name="oval:org.mitre.oval:def:16057"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6593" name="oval:org.mitre.oval:def:6593"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5929" xml:lang="en">http://isc.sans.org/diary.html?storyid=5929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=773" xml:lang="en">20090224 Adobe Flash Player Invalid Object Reference Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0332.html" xml:lang="en">RHSA-2009:0332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0334.html" xml:lang="en">RHSA-2009:0334</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-23.xml" xml:lang="en">GLSA-200903-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021750" xml:lang="en">1021750</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1" xml:lang="en">254909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-01.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33880" xml:lang="en">33880</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0513" xml:lang="en">ADV-2009-0513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0743" xml:lang="en">ADV-2009-0743</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487142" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487142</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48887" xml:lang="en">flash-invalid-object-bo(48887)</vuln:reference>
    </vuln:references>
    <vuln:summary>Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 does not properly remove references to destroyed objects during Shockwave Flash file processing, which allows remote attackers to execute arbitrary code via a crafted file, related to a "buffer overflow issue."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0521">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.12.36"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.15.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:linux:linux"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.12.36</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.15.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0521</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6160" name="oval:org.mitre.oval:def:6160"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5929" xml:lang="en">http://isc.sans.org/diary.html?storyid=5929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0332.html" xml:lang="en">RHSA-2009:0332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-23.xml" xml:lang="en">GLSA-200903-23</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-01.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0513" xml:lang="en">ADV-2009-0513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487144" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48904" xml:lang="en">flash-unspecified-information-disclosure(48904)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Linux allows local users to obtain sensitive information or gain privileges via a crafted library in a directory contained in the RPATH.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0522">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:adobe:air:1.5"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.25"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.63::linux"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.69.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.0.70.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.1.1"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:7.2"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::basic"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.24.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.34.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.35.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:8.0.39.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.20.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.28.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.31.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.45.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.47.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.48.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.112.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.114.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.115.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:9.0.124.0"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.0.584"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.10"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:10.0.12.36"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs3::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player:cs4::pro"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flash_player_for_linux:10.0.15.3"/>
          <cpe-lang:fact-ref name="cpe:/a:adobe:flex:3.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:air:1.5</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.25</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.63::linux</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.69.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.0.70.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:7.2</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::basic</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.24.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.34.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.35.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:8.0.39.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.16</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.20.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.28.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.31.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.45.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.47.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.48.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.112.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.114.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.115.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:9.0.124.0</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.0.584</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.10</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:10.0.12.36</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs3::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player:cs4::pro</vuln:product>
      <vuln:product>cpe:/a:adobe:flash_player_for_linux:10.0.15.3</vuln:product>
      <vuln:product>cpe:/a:adobe:flex:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0522</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.277-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6674" name="oval:org.mitre.oval:def:6674"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?storyid=5929" xml:lang="en">http://isc.sans.org/diary.html?storyid=5929</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021752" xml:lang="en">1021752</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-01.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0513" xml:lang="en">ADV-2009-0513</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48903" xml:lang="en">flash-unspecified-click-hijacking(48903)</vuln:reference>
    </vuln:references>
    <vuln:summary>Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Windows allows remote attackers to trick a user into visiting an arbitrary URL via an unspecified manipulation of the "mouse pointer display," related to a "Clickjacking attack."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0523">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp:6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp:7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp_server:6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp_server:7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:robohelp:6</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp:7</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp_server:6</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp_server:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0523</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.627-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021755" xml:lang="en">1021755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-02.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33887" xml:lang="en">33887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0512" xml:lang="en">ADV-2009-0512</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48890" xml:lang="en">robohelp-errors-log-xss(48890)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Adobe RoboHelp Server 6 and 7 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, which is not properly handled when displaying the Help Errors log.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0524">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp:6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp:7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp_server:6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:robohelp_server:7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:robohelp:6</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp:7</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp_server:6</vuln:product>
      <vuln:product>cpe:/a:adobe:robohelp_server:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0524</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:19.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.687-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021755" xml:lang="en">1021755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-02.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-02.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33888" xml:lang="en">33888</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0512" xml:lang="en">ADV-2009-0512</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48889" xml:lang="en">robohelp-generated-files-xss(48889)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Adobe RoboHelp 6 and 7, and RoboHelp Server 6 and 7, allows remote attackers to inject arbitrary web script or HTML via vectors involving files produced by RoboHelp.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0525">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:modernmethod:sajax:0.12"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:modernmethod:sajax:0.12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0525</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-12T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-12T09:39:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33711" xml:lang="en">33711</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the sajax_get_common_js function in php/Sajax.php in Sajax 0.12 allows remote attackers to inject arbitrary web script or HTML via the URL parameter, which is not properly handled when using browsers that do not URL-encode requests, such as Internet Explorer 6.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0526">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adaptcms:adaptcms:1.4:unknown:lite"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adaptcms:adaptcms:1.4:unknown:lite</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0526</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.357-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33698" xml:lang="en">33698</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48611" xml:lang="en">adaptcms-index-xss(48611)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8016" xml:lang="en">8016</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in index.php in AdaptCMS Lite 1.4 allow remote attackers to inject arbitrary web script or HTML via the (1) url and (2) acuparam parameters, and (3) the URI.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0527">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adaptcms:adaptcms:1.4:unknown:lite"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adaptcms:adaptcms:1.4:unknown:lite</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0527</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.437-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.417-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33698" xml:lang="en">33698</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48610" xml:lang="en">adaptcms-sitepath-file-include(48610)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8016" xml:lang="en">8016</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in plugins/rss_importer_functions.php in AdaptCMS Lite 1.4 allows remote attackers to execute arbitrary PHP code via a URL in the sitepath parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0528">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rhadrix:if-cms:2.07"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rhadrix:if-cms:2.07</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0528</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.747-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33697" xml:lang="en">33697</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8007" xml:lang="en">8007</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in frame.php in Rhadrix If-CMS 2.07 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0529">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:electrictoad:snippetmaster_webpage_editor:2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:electrictoad:snippetmaster_webpage_editor:2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0529</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:51.950-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33705" xml:lang="en">33705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8017" xml:lang="en">8017</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.php in SnippetMaster Webpage Editor 2.2.2 allows remote attackers to inject arbitrary web script or HTML via the language parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0530">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:electrictoad:snippetmaster_webpage_editor:2.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:electrictoad:snippetmaster_webpage_editor:2.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0530</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.013-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33705" xml:lang="en">33705</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8017" xml:lang="en">8017</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in SnippetMaster 2.2.2, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) _SESSION[SCRIPT_PATH] parameter to includes/vars.inc.php and the (2) g_pcltar_lib_dir parameter to includes/tar_lib/pcltar.lib.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0531">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ontarioabandonedplaces:a_better_member-based_asp_photo_gallery:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ontarioabandonedplaces:a_better_member-based_asp_photo_gallery:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0531</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.ontarioabandonedplaces.com/ipguardian/gallery/readme.txt" xml:lang="en">http://www.ontarioabandonedplaces.com/ipguardian/gallery/readme.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33693" xml:lang="en">33693</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48612" xml:lang="en">bettermember-view-sql-injection(48612)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8012" xml:lang="en">8012</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in gallery/view.asp in A Better Member-Based ASP Photo Gallery before 1.2 allows remote attackers to execute arbitrary SQL commands via the entry parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0532">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:scripts-for-sites:ez_baby:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:scripts-for-sites:ez_baby:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0532</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.923-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33635" xml:lang="en">33635</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48547" xml:lang="en">ezbaby-password-xss(48547)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in password.php in Scripts For Sites (SFS) EZ Baby allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving the u2 parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0533">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:scripts-for-sites:ez_reminder:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:scripts-for-sites:ez_reminder:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0533</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:58.970-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33641" xml:lang="en">33641</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48548" xml:lang="en">ezreminder-password-xss(48548)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in password.php in Scripts for Sites EZ Reminder allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly involving the u2 parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0534">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:flexcms:flexcms"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:flexcms:flexcms</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0534</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.123-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33696" xml:lang="en">33696</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48609" xml:lang="en">flexcms-catid-sql-injection(48609)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8018" xml:lang="en">8018</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in FlexCMS allows remote attackers to execute arbitrary SQL commands via the catId parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0535">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:extrosoft:thyme:1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:extrosoft:thyme:1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0535</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8029" xml:lang="en">8029</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in export.php in Thyme 1.3 and earlier, when register_globals is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the export_to parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0536">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1.1"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:ibm:aix:5.2.0</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.0</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.7</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.8</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:5.3.9</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1.0</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1.1</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0536</vuln:cve-id>
    <vuln:published-datetime>2009-02-11T15:30:00.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.230-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6155" name="oval:org.mitre.oval:def:6155"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://aix.software.ibm.com/aix/efixes/security/at_advisory.asc" xml:lang="en">http://aix.software.ibm.com/aix/efixes/security/at_advisory.asc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43452" xml:lang="en">IZ43452</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43453" xml:lang="en">IZ43453</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43454" xml:lang="en">IZ43454</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43455" xml:lang="en">IZ43455</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43456" xml:lang="en">IZ43456</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43457" xml:lang="en">IZ43457</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43458" xml:lang="en">IZ43458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www.ibm.com/support/docview.wss?uid=isg1IZ43459" xml:lang="en">IZ43459</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33730" xml:lang="en">33730</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021704" xml:lang="en">1021704</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0405" xml:lang="en">ADV-2009-0405</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4558" xml:lang="en">http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&amp;ID=4558</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48660" xml:lang="en">ibm-aix-at-information-disclosure(48660)</vuln:reference>
    </vuln:references>
    <vuln:summary>at in bos.rte.cron on IBM AIX 5.2.0, 5.3.0 through 5.3.9, and 6.1.0 through 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0537">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:interix:6.0::10.0.6030.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.1"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.2"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.3"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.4"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.5"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.7"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.8"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:2.9"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.1"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.2"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.3"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.4"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.5"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.6"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.7"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.8"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:3.9"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.1"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:interix:6.0::10.0.6030.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.1</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.2</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.3</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.4</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.5</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.6</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.7</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.8</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:2.9</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.1</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.2</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.3</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.4</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.5</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.6</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.7</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.8</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:3.9</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.1</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.2</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.3</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0537</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:54.760-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/60" xml:lang="en">20090304 libc:fts_*():multiple vendors, Denial-of-service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c" xml:lang="en">http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41;r2=1.42;f=h" xml:lang="en">http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41;r2=1.42;f=h</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501505/100/0/threaded" xml:lang="en">20090305 libc:fts_*():multiple vendors, Denial-of-service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34008" xml:lang="en">34008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021818" xml:lang="en">1021818</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8163" xml:lang="en">8163</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0538">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:10.5"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:11.0"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:11.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:11.5"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:11.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:12.0"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:pcanywhere:12.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:symantec:pcanywhere:10.0</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:10.5</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:11.0</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:11.0.1</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:11.5</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:11.5.1</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:12.0</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:12.1</vuln:product>
      <vuln:product>cpe:/a:symantec:pcanywhere:12.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0538</vuln:cve-id>
    <vuln:published-datetime>2009-03-18T11:30:00.453-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:55.730-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html" xml:lang="en">http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021855" xml:lang="en">1021855</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.layereddefense.com/pcanywhere17mar.html" xml:lang="en">http://www.layereddefense.com/pcanywhere17mar.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501930/100/0/threaded" xml:lang="en">20090318 Layered Defense Research Advisory: Format String Vulnerablity in Symantec PcAnywhere v10-12.5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33845" xml:lang="en">33845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0755" xml:lang="en">ADV-2009-0755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49291" xml:lang="en">symantec-pcanywhere-unspecified-dos(49291)</vuln:reference>
    </vuln:references>
    <vuln:summary>Format string vulnerability in Symantec pcAnywhere before 12.5 SP1 allows local users to read and modify arbitrary memory locations, and cause a denial of service (application crash) or possibly have unspecified other impact, via format string specifiers in the pathname of a remote control file (aka .CHF file).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0540">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:insightinformatics:libero:5.3:sp5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:insightinformatics:libero:5.3:sp5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0540</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T11:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:59.203-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-02/0243.html" xml:lang="en">20090222 Libero Cross-Site Scripting Vulnerability - Security Advisory - SOS-09-001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33856" xml:lang="en">33856</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0493" xml:lang="en">ADV-2009-0493</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48870" xml:lang="en">libero-searchterm-xss(48870)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Libero 5.3 SP5, and possibly other versions before 5.5 SP1, allows remote attackers to inject arbitrary web script or HTML via the search term field.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0541">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:magentocommerc:magento:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:magentocommerc:magento:1.2.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:magentocommerc:magento:1.2.0</vuln:product>
      <vuln:product>cpe:/a:magentocommerc:magento:1.2.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0541</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T11:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:59.267-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-02/0257.html" xml:lang="en">20090223 Magento Multiple Cross-Site Scripting Vulnerabilities - Security Advisory - SOS-09-002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021746" xml:lang="en">1021746</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33872" xml:lang="en">33872</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48876" xml:lang="en">magento-login-xss(48876)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48877" xml:lang="en">magento-forgotpasswordaction-xss(48877)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48878" xml:lang="en">magneto-downloader-xss(48878)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Magento 1.2.0 and 1.2.1.1 allow remote attackers to inject arbitrary web script or HTML via (1) the username field in an admin/ request to index.php, possibly related to the login[username] parameter and the app/code/core/Mage/Admin/Model/Session.php login function; (2) the email address field in an admin/index/forgotpassword/ request to index.php, possibly related to the email parameter and the app/code/core/Mage/Adminhtml/controllers/IndexController.php forgotpasswordAction function; or (3) the return parameter to the default URI under downloader/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0542">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:proftpd_project:proftpd:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:proftpd_project:proftpd:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:proftpd_project:proftpd:1.3.2_rc2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:proftpd_project:proftpd:1.3.1</vuln:product>
      <vuln:product>cpe:/a:proftpd_project:proftpd:1.3.2</vuln:product>
      <vuln:product>cpe:/a:proftpd_project:proftpd:1.3.2_rc2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0542</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T11:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-11T17:01:56.557-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.proftpd.org/show_bug.cgi?id=3180" xml:lang="en">http://bugs.proftpd.org/show_bug.cgi?id=3180</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-27.xml" xml:lang="en">GLSA-200903-27</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1730" xml:lang="en">DSA-1730</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:061" xml:lang="en">MDVSA-2009:061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/11/1" xml:lang="en">[oss-security] 20090211 CVE request for proftpd</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/11/3" xml:lang="en">[oss-security] 20090211 Re: CVE request for proftpd</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/11/5" xml:lang="en">[oss-security] 20090211 Re: CVE request for proftpd</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500823/100/0/threaded" xml:lang="en">20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500833/100/0/threaded" xml:lang="en">20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500851/100/0/threaded" xml:lang="en">20090210 ProFTPd with mod_mysql Authentication Bypass Exploit</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500852/100/0/threaded" xml:lang="en">20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8037" xml:lang="en">8037</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0543">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:proftpd:proftpd:1.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:proftpd:proftpd:1.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0543</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T11:30:00.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-09T01:32:35.297-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.proftpd.org/show_bug.cgi?id=3173" xml:lang="en">http://bugs.proftpd.org/show_bug.cgi?id=3173</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200903-27.xml" xml:lang="en">GLSA-200903-27</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1730" xml:lang="en">DSA-1730</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:061" xml:lang="en">MDVSA-2009:061</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/11/4" xml:lang="en">[oss-security] 20090211 CVE request for proftpd</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/11/5" xml:lang="en">[oss-security] 20090211 Re: CVE request for proftpd</vuln:reference>
    </vuln:references>
    <vuln:summary>ProFTPD Server 1.3.1, with NLS support enabled, allows remote attackers to bypass SQL injection protection mechanisms via invalid, encoded multibyte characters, which are not properly handled in (1) mod_sql_mysql and (2) mod_sql_postgres.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0544">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pycrypto:arc2:2.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pycrypto:arc2:2.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0544</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T12:30:00.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:59.330-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=d1c4875e1f220652fe7ff8358f56dee3b2aba31b" xml:lang="en">http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=d1c4875e1f220652fe7ff8358f56dee3b2aba31b</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=fd73731dfad451a81056fbb01e09aa78ab82eb5d" xml:lang="en">http://gitweb2.dlitz.net/?p=crypto/pycrypto-2.x.git;a=commitdiff;h=fd73731dfad451a81056fbb01e09aa78ab82eb5d</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-11.xml" xml:lang="en">GLSA-200903-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:049" xml:lang="en">MDVSA-2009:049</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:050" xml:lang="en">MDVSA-2009:050</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/07/1" xml:lang="en">[oss-security] 20090207 CVE Request: pycrypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/12/5" xml:lang="en">[oss-security] 20090212 Re: CVE Request: pycrypto</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33674" xml:lang="en">33674</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48617" xml:lang="en">pycrypto-arc2module-bo(48617)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the PyCrypto ARC2 module 2.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0545">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta10"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta11"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:zeroshell:zeroshell:1.0:beta9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta10</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta11</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta3</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta4</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta5</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta6</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta7</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta8</vuln:product>
      <vuln:product>cpe:/a:zeroshell:zeroshell:1.0:beta9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0545</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T18:30:01.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:01.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ikkisoft.com/stuff/LC-2009-01.txt" xml:lang="en">http://www.ikkisoft.com/stuff/LC-2009-01.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500763/100/0/threaded" xml:lang="en">20090209 ZeroShell &lt;= 1.0beta11 Remote Code Execution</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0385" xml:lang="en">ADV-2009-0385</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zeroshell.net/eng/announcements/" xml:lang="en">http://www.zeroshell.net/eng/announcements/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zeroshell.net/eng/patch-details/#C100" xml:lang="en">http://www.zeroshell.net/eng/patch-details/#C100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8023" xml:lang="en">8023</vuln:reference>
    </vuln:references>
    <vuln:summary>cgi-bin/kerbynet in ZeroShell 1.0beta11 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the type parameter in a NoAuthREQ x509List action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0546">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:newsgator:feeddemon:2.0.0.24"/>
        <cpe-lang:fact-ref name="cpe:/a:newsgator:feeddemon:2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:newsgator:feeddemon:2.6.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:newsgator:feeddemon:2.6.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:newsgator:feeddemon:2.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:newsgator:feeddemon:2.0.0.24</vuln:product>
      <vuln:product>cpe:/a:newsgator:feeddemon:2.6</vuln:product>
      <vuln:product>cpe:/a:newsgator:feeddemon:2.6.1.4</vuln:product>
      <vuln:product>cpe:/a:newsgator:feeddemon:2.6.1.5</vuln:product>
      <vuln:product>cpe:/a:newsgator:feeddemon:2.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0546</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T18:30:01.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:02.027-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://security.bkis.vn/?p=329" xml:lang="en">http://security.bkis.vn/?p=329</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500686/100/0/threaded" xml:lang="en">20090205 [SVRT-02-09] FeedDemon (ver&lt;=2.7) Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33630" xml:lang="en">33630</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7995" xml:lang="en">7995</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8010" xml:lang="en">8010</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in NewsGator FeedDemon 2.7 and earlier allows user-assisted remote attackers to execute arbitrary code via a long text attribute in an outline element in a .opml file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0547">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:evolution:evolution:2.22.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:evolution:evolution:2.22.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0547</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T18:30:01.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:52.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9619" name="oval:org.mitre.oval:def:9619"/>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508479" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508479</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.gnome.org/show_bug.cgi?id=564465" xml:lang="en">http://bugzilla.gnome.org/show_bug.cgi?id=564465</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html" xml:lang="en">SUSE-SR:2010:006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" xml:lang="en">SUSE-SR:2010:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" xml:lang="en">SUSE-SR:2010:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/02/10/7" xml:lang="en">[oss-security] 20090210 CVE Request -- evolution</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1813" xml:lang="en">DSA-1813</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:078" xml:lang="en">MDVSA-2009:078</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0354.html" xml:lang="en">RHSA-2009:0354</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0355.html" xml:lang="en">RHSA-2009:0355</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33720" xml:lang="en">33720</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1107" xml:lang="en">ADV-2010-1107</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=484925" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=484925</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00666.html" xml:lang="en">FEDORA-2009-2784</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00672.html" xml:lang="en">FEDORA-2009-2792</vuln:reference>
    </vuln:references>
    <vuln:summary>Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0548">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:eset:remote_administrator:3.0.35"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:eset:remote_administrator:3.0.35</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0548</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T18:30:01.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2011-03-07T22:18:41.500-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.eset.eu/support/changelog-eset-remote-administrator-3" xml:lang="en">http://www.eset.eu/support/changelog-eset-remote-administrator-3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0339" xml:lang="en">ADV-2009-0339</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the Additional Report Settings interface in ESET Remote Administrator before 3.0.105 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0549">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0549</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:25.660-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5830" name="oval:org.mitre.oval:def:5830"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35215" xml:lang="en">35215</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; and Microsoft Office Excel Viewer 2003 SP3 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Record Pointer Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0550">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x32"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:5.01:sp4"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6.0:sp1"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:5.01:sp4</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:6.0:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp1:itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::32_bit</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::itanium</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x32</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:gold</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp:::x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:pro_x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:x64</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0550</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.593-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5320" name="oval:org.mitre.oval:def:5320"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6233" name="oval:org.mitre.oval:def:6233"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7569" name="oval:org.mitre.oval:def:7569"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/04/14/ntlm-credential-reflection-updates-for-http-clients.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/04/14/ntlm-credential-reflection-updates-for-http-clients.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138" xml:lang="en">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34439" xml:lang="en">34439</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022041" xml:lang="en">1022041</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1027" xml:lang="en">ADV-2009-1027</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1028" xml:lang="en">ADV-2009-1028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-013" xml:lang="en">MS09-013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014" xml:lang="en">MS09-014</vuln:reference>
    </vuln:references>
    <vuln:summary>Windows HTTP Services (aka WinHTTP) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008; and WinINet in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008; allows remote web servers to capture and replay NTLM credentials, and execute arbitrary code, via vectors related to absence of a "credential-reflection protections" opt-in step, aka "Windows HTTP Services Credential Reflection Vulnerability" and "WinINet Credential Reflection Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0551">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0551</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.627-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6164" name="oval:org.mitre.oval:def:6164"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138" xml:lang="en">http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&amp;id=871138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022042" xml:lang="en">1022042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1028" xml:lang="en">ADV-2009-1028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014" xml:lang="en">MS09-014</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 does not properly handle transition errors in a request for one HTTP document followed by a request for a second HTTP document, which allows remote attackers to execute arbitrary code via vectors involving (1) multiple crafted pages on a web site or (2) a web page with crafted inline content such as banner advertisements, aka "Page Transition Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0552">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:5.0.1:sp4"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6.0:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:ie:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:ie:5.0.1:sp4</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:ie:6.0:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0552</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5551" name="oval:org.mitre.oval:def:5551"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022042" xml:lang="en">1022042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1028" xml:lang="en">ADV-2009-1028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014" xml:lang="en">MS09-014</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 on Windows XP SP2 and SP3, and 6 on Windows Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0553">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0553</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.670-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6069" name="oval:org.mitre.oval:def:6069"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://skypher.com/index.php/2009/04/19/ms09-014-embed-element-memory-corruption/" xml:lang="en">http://skypher.com/index.php/2009/04/19/ms09-014-embed-element-memory-corruption/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34424" xml:lang="en">34424</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022042" xml:lang="en">1022042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1028" xml:lang="en">ADV-2009-1028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014" xml:lang="en">MS09-014</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0554">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:pro_x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp1:itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::32_bit"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::itanium"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:gold"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp:::x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:x64"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:5.01:sp4"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:internet_explorer:6:sp1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:internet_explorer:5.01:sp4</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:6:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:internet_explorer:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0554</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T04:00:00.687-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-26T09:04:00.993-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5723" name="oval:org.mitre.oval:def:5723"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022042" xml:lang="en">1022042</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-104A.html" xml:lang="en">TA09-104A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1028" xml:lang="en">ADV-2009-1028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014" xml:lang="en">MS09-014</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0555">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_player:9"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:9.0"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:9.5"/>
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:9.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2003:-:sp2"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_media_format_runtime:11"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::~~~~x86~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:~~~~x86~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1:~~~~x64~"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2:~~~~x64~"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:windows_media_format_runtime:9.0</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_media_format_runtime:9.5</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_media_format_runtime:11</vuln:product>
      <vuln:product>cpe:/a:microsoft:windows_media_player:9</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2003:-:sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::~~~~x86~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:~~~~x86~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0555</vuln:cve-id>
    <vuln:published-datetime>2009-10-14T06:30:00.920-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-02-27T20:20:18.863-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2019-02-27T13:55:47.313-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6407" name="oval:org.mitre.oval:def:6407"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-286A.html" xml:lang="en">TA09-286A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-051" xml:lang="en">MS09-051</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Windows Media Runtime, as used in DirectShow WMA Voice Codec, Windows Media Audio Voice Decoder, and Audio Compression Manager (ACM), does not properly process Advanced Systems Format (ASF) files, which allows remote attackers to execute arbitrary code via a crafted audio file that uses the Windows Media Speech codec, aka "Windows Media Runtime Voice Sample Rate Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0556">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_powerpoint:2004"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:powerpoint:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:powerpoint:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:powerpoint:2003:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_powerpoint:2004</vuln:product>
      <vuln:product>cpe:/a:microsoft:powerpoint:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:powerpoint:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:powerpoint:2003:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0556</vuln:cve-id>
    <vuln:published-datetime>2009-04-03T14:30:00.610-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:34.863-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6204" name="oval:org.mitre.oval:def:6204"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6279" name="oval:org.mitre.oval:def:6279"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx" xml:lang="en">http://blogs.technet.com/mmpc/archive/2009/04/02/new-0-day-exploits-using-powerpoint-files.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx" xml:lang="en">http://blogs.technet.com/msrc/archive/2009/04/02/microsoft-security-advisory-969136.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/04/02/investigating-the-new-powerpoint-issue.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/627331" xml:lang="en">VU#627331</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.microsoft.com/technet/security/advisory/969136.mspx" xml:lang="en">http://www.microsoft.com/technet/security/advisory/969136.mspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503453/100/0/threaded" xml:lang="en">20090512 ZDI-09-019: Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34351" xml:lang="en">34351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021967" xml:lang="en">1021967</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-132A.html" xml:lang="en">TA09-132A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0915" xml:lang="en">ADV-2009-0915</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1290" xml:lang="en">ADV-2009-1290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-019" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017" xml:lang="en">MS09-017</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49632" xml:lang="en">powerpoint-unspecified-code-execution(49632)</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0557">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0557</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:37.457-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5564" name="oval:org.mitre.oval:def:5564"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35241" xml:lang="en">35241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Object Record Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0558">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0558</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:38.397-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11525" name="oval:org.mitre.oval:def:11525"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504188/100/0/threaded" xml:lang="en">20090609 Secunia Research: Microsoft Excel Record Parsing Array Indexing Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35242" xml:lang="en">35242</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Array index error in Excel in Microsoft Office 2000 SP3 and Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac, allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Array Indexing Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0559">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0559</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:39.740-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6273" name="oval:org.mitre.oval:def:6273"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35243" xml:lang="en">35243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Excel in Microsoft Office 2000 SP3 and Office XP SP3 allows remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "String Copy Stack-Based Overrun Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0560">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0560</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:40.410-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6178" name="oval:org.mitre.oval:def:6178"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35244" xml:lang="en">35244</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allow remote attackers to execute arbitrary code via a crafted Excel file with a malformed record object, aka "Field Sanitization Memory Corruption Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0561">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_excel_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_excel_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp1:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x32</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_sharepoint_server:2007:sp2:x64</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0561</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:41.367-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5925" name="oval:org.mitre.oval:def:5925"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>IDEFENSE</vuln:source>
      <vuln:reference href="http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=805" xml:lang="en">20090609 Microsoft Excel SST Record Integer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504190/100/0/threaded" xml:lang="en">20090609 Secunia Research: Microsoft Excel String Parsing Integer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35245" xml:lang="en">35245</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022351" xml:lang="en">1022351</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1540" xml:lang="en">ADV-2009-1540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-021" xml:lang="en">MS09-021</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in Excel in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, and Office 2004 and 2008 for Mac; Excel in 2007 Microsoft Office System SP1 and SP2; Open XML File Format Converter for Mac; Microsoft Office Excel Viewer 2003 SP3; Microsoft Office Excel Viewer; Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2; and Microsoft Office SharePoint Server 2007 SP1 and SP2 allows remote attackers to execute arbitrary code via an Excel file with a Shared String Table (SST) record with a numeric field that specifies an invalid number of unique strings, which triggers a heap-based buffer overflow, aka "Record Integer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0562">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:isa_server:2004:sp3:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:isa_server:2004:sp3:standard"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:isa_server:2006:sp1:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:isa_server:2006:sp1:standard"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:-::small_business_accounting_2006"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:xp:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_web_components:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_web_components:2003:sp1:2007_microsoft_office"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_web_components:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_web_components:xp:sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:isa_server:2004:sp3:enterprise</vuln:product>
      <vuln:product>cpe:/a:microsoft:isa_server:2004:sp3:standard</vuln:product>
      <vuln:product>cpe:/a:microsoft:isa_server:2006:sp1:enterprise</vuln:product>
      <vuln:product>cpe:/a:microsoft:isa_server:2006:sp1:standard</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:-::small_business_accounting_2006</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:xp:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_web_components:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_web_components:2003:sp1:2007_microsoft_office</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_web_components:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_web_components:xp:sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0562</vuln:cve-id>
    <vuln:published-datetime>2009-08-12T13:30:00.390-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:42.663-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6337" name="oval:org.mitre.oval:def:6337"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022708" xml:lang="en">1022708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-223A.html" xml:lang="en">TA09-223A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043" xml:lang="en">MS09-043</vuln:reference>
    </vuln:references>
    <vuln:summary>The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 does not properly allocate memory, which allows remote attackers to execute arbitrary code via unspecified vectors that trigger "system state" corruption, aka "Office Web Components Memory Allocation Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0563">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0563</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:43.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6133" name="oval:org.mitre.oval:def:6133"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504204/100/0/threaded" xml:lang="en">20090610 ZDI-09-035: Microsoft Word Document Stack Based Buffer Overflow Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35188" xml:lang="en">35188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022356" xml:lang="en">1022356</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1546" xml:lang="en">ADV-2009-1546</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.zerodayinitiative.com/advisories/ZDI-09-035" xml:lang="en">http://www.zerodayinitiative.com/advisories/ZDI-09-035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027" xml:lang="en">MS09-027</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; Microsoft Office Word Viewer 2003 SP3; Microsoft Office Word Viewer; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a crafted tag containing an invalid length field, aka "Word Buffer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0565">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2004::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office:2008::mac"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2000:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2002:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2007:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word:2007:sp2"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word_viewer"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_word_viewer:2003:sp3"/>
        <cpe-lang:fact-ref name="cpe:/a:microsoft:open_xml_file_format_converter:::mac"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office:2004::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office:2008::mac</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_compatibility_pack_for_word_excel_ppt_2007::sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2000:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2002:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2007:sp1</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word:2007:sp2</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word_viewer</vuln:product>
      <vuln:product>cpe:/a:microsoft:office_word_viewer:2003:sp3</vuln:product>
      <vuln:product>cpe:/a:microsoft:open_xml_file_format_converter:::mac</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0565</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:44.350-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6334" name="oval:org.mitre.oval:def:6334"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASON</vuln:source>
      <vuln:reference href="http://securityreason.com/securityalert/8206" xml:lang="en">8206</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35190" xml:lang="en">35190</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022356" xml:lang="en">1022356</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1546" xml:lang="en">ADV-2009-1546</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-027" xml:lang="en">MS09-027</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, and 2007 SP1 and SP2; Microsoft Office for Mac 2004 and 2008; Open XML File Format Converter for Mac; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 allows remote attackers to execute arbitrary code via a Word document with a malformed record that triggers memory corruption, aka "Word Buffer Overflow Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0566">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:office_publisher:2007:sp1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:office_publisher:2007:sp1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0566</vuln:cve-id>
    <vuln:published-datetime>2009-07-15T11:30:01.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:45.380-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6285" name="oval:org.mitre.oval:def:6285"/>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35599" xml:lang="en">35599</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022546" xml:lang="en">1022546</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-195A.html" xml:lang="en">TA09-195A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1888" xml:lang="en">ADV-2009-1888</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-030" xml:lang="en">MS09-030</vuln:reference>
    </vuln:references>
    <vuln:summary>Microsoft Office Publisher 2007 SP1 does not properly calculate object handler data for Publisher files, which allows remote attackers to execute arbitrary code via a crafted file in a legacy format that triggers memory corruption, aka "Pointer Dereference Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0567">
    <vuln:cve-id>CVE-2009-0567</vuln:cve-id>
    <vuln:published-datetime>2017-05-11T10:29:09.137-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-11T10:29:09.137-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2009. Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0568">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2000::sp4"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008::~~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server:2008::~sp2~~~itanium~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008:::~~~~x86~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_server_2008::sp2:~~~~x86~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:::~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp1"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_vista:-"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp2:~~~~x64~"/>
        <cpe-lang:fact-ref name="cpe:/o:microsoft:windows_xp::sp3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:microsoft:windows_2000::sp4</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_2003_server::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008::~~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server:2008::~sp2~~~itanium~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008:::~~~~x86~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_server_2008::sp2:~~~~x86~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:::~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp1</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_vista:-</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp2:~~~~x64~</vuln:product>
      <vuln:product>cpe:/o:microsoft:windows_xp::sp3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0568</vuln:cve-id>
    <vuln:published-datetime>2009-06-10T14:00:00.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-12T17:50:46.083-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6227" name="oval:org.mitre.oval:def:6227"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://blogs.technet.com/srd/archive/2009/06/09/ms09-026-how-a-developer-can-know-if-their-rpc-interface-is-affected.aspx" xml:lang="en">http://blogs.technet.com/srd/archive/2009/06/09/ms09-026-how-a-developer-can-know-if-their-rpc-interface-is-affected.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35219" xml:lang="en">35219</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022357" xml:lang="en">1022357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-160A.html" xml:lang="en">TA09-160A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1545" xml:lang="en">ADV-2009-1545</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MS</vuln:source>
      <vuln:reference href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026" xml:lang="en">MS09-026</vuln:reference>
    </vuln:references>
    <vuln:summary>The RPC Marshalling Engine (aka NDR) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly maintain its internal state, which allows remote attackers to overwrite arbitrary memory locations via a crafted RPC message that triggers incorrect pointer reading, related to "IDL interfaces containing a non-conformant varying array" and FC_SMVARRAY, FC_LGVARRAY, FC_VARIABLE_REPEAT, and FC_VARIABLE_OFFSET, aka "RPC Marshalling Engine Vulnerability."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0569">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:1.26.3"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:1.26.4"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:1.26.5"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.0"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.05"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.06"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.07"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.08"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.09"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.10"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.00.11"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.05"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.06"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.07"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.08"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.09"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.10"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.05.11"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.06"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.06.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.07"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.07.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.07.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.07.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.07.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.08"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.08.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.09"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.09.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.10.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.10.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.10.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.10.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.11.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.11.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.12.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.05"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.06"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.20.07"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.21"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.21.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.21.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.21.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.21.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.22"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.22.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.22.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.23"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.24"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.24.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.24.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.25"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.25.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.25.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.26"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.27"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.28"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.28.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.29"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.30"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.30.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.30.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.30.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.30.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.31.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.40.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.40.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.40.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.40.03"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.40.04"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.41.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.42.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.43.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.44.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.45.00"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.45.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.45.02"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.46"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.47"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.47.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.48"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.48.01"/>
        <cpe-lang:fact-ref name="cpe:/a:rimarts:becky%21_internet_mail:2.48.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:1.26.3</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:1.26.4</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:1.26.5</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.0</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.05</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.06</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.07</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.08</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.09</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.10</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.00.11</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.05</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.06</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.07</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.08</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.09</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.10</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.05.11</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.06</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.06.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.07</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.07.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.07.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.07.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.07.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.08</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.08.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.09</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.09.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.10</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.10.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.10.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.10.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.10.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.11</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.11.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.11.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.12</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.12.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.05</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.06</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.20.07</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.21</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.21.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.21.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.21.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.21.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.22</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.22.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.22.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.23</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.24</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.24.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.24.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.25</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.25.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.25.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.26</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.27</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.28</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.28.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.29</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.30</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.30.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.30.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.30.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.30.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.31.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.40.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.40.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.40.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.40.03</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.40.04</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.41.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.42.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.43.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.44.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.45.00</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.45.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.45.02</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.46</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.47</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.47.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.48</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.48.01</vuln:product>
      <vuln:product>cpe:/a:rimarts:becky%21_internet_mail:2.48.02</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0569</vuln:cve-id>
    <vuln:published-datetime>2009-02-12T20:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-07T21:33:59.470-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN29641290/index.html" xml:lang="en">JVN#29641290</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html" xml:lang="en">JVNDB-2009-000011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.rimarts.jp/downloads/B2/Readme-e.txt" xml:lang="en">http://www.rimarts.jp/downloads/B2/Readme-e.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33756" xml:lang="en">33756</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48684" xml:lang="en">becky-readreceipt-bo(48684)</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0570">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ninjadesigns:mailist:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ninjadesigns:mailist:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0570</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.733-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:53.873-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33648" xml:lang="en">33648</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8001" xml:lang="en">8001</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in send.php in Ninja Designs Mailist 3.0, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the load parameter.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0571">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ninjadesigns:mailist:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ninjadesigns:mailist:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0571</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.750-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:53.920-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8001" xml:lang="en">8001</vuln:reference>
    </vuln:references>
    <vuln:summary>admin.php in Ninja Designs Mailist 3.0 stores backup copies of maillist.php under the web root with insufficient access control, which allows remote attackers to obtain sensitive information via a direct request to the backup directory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0572">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:flatnux:flatnux:2009-01-27"/>
        <cpe-lang:fact-ref name="cpe:/a:flatnux:flatnux:2009-02-04"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:flatnux:flatnux:2009-01-27</vuln:product>
      <vuln:product>cpe:/a:flatnux:flatnux:2009-02-04</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0572</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.767-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:07.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500663/100/0/threaded" xml:lang="en">20090202 flatnux Flatnux-2009-01-27 Remote File Include</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33599" xml:lang="en">33599</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48491" xml:lang="en">flatnuxcms-fnrootpath-file-include(48491)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7969" xml:lang="en">7969</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in include/flatnux.php in FlatnuX CMS (aka Flatnuke3) 2009-01-27 and 2009-02-04, when register_globals is enabled and magic_quotes_gpc disabled, allows remote attackers to execute arbitrary PHP code via a URL in the _FNROOTPATH parameter to (1) index.php and (2) filemanager.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0573">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fotoware:fotoweb:6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fotoware:fotoweb:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0573</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.780-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-16T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-16T08:33:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.fortconsult.net/images/pdf/advisories/FotoWebXSS_final.pdf" xml:lang="en">http://www.fortconsult.net/images/pdf/advisories/FotoWebXSS_final.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33677" xml:lang="en">33677</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in FotoWeb 6.0 (Build 273) allow remote attackers to inject arbitrary web script or HTML via the (1) s parameter to cmdrequest/Login.fwx and the (2) search parameter to Grid.fwx.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0574">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cafeengine:easycafeengine:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cafeengine:easycafeengine:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0574</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:54.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33655" xml:lang="en">33655</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0359" xml:lang="en">ADV-2009-0359</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8002" xml:lang="en">8002</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in Easy CafeEngine allows remote attackers to execute arbitrary SQL commands via the catid parameter, a different vector than CVE-2008-4604.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0575">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.0beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.0beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.0beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.0beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:5.x-1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:6.x-1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:6.x-1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:6.x-1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:drupal:views_bulk_operations:6.x-1.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.0</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.0beta1</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.0beta3</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.0beta4</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.0beta5</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.1</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:5.x-1.2</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:6.x-1.0</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:6.x-1.1</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:6.x-1.2</vuln:product>
      <vuln:product>cpe:/a:drupal:views_bulk_operations:6.x-1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0575</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:54.693-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/369223" xml:lang="en">http://drupal.org/node/369223</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33622" xml:lang="en">33622</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48516" xml:lang="en">viewsbulk-themeviewsbulk-xss(48516)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the theme_views_bulk_operations_confirmation function in views_bulk_operations.module in Views Bulk Operations 5.x before 5.x-1.3 and 6.x before 6.x-1.4, a module for Drupal, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to node titles.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0576">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:5.0:-:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_directory_server:5.0:-:enterprise</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_directory_server:5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0576</vuln:cve-id>
    <vuln:published-datetime>2009-02-13T12:30:00.843-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:54.740-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-116837-04-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-116837-04-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-250086-1" xml:lang="en">250086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33732" xml:lang="en">33732</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0409" xml:lang="en">ADV-2009-0409</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48662" xml:lang="en">sun-java-sds-ldap-dos(48662)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Sun Java System Directory Server 5.2 p6 and earlier, and Enterprise Edition 5, allows remote attackers to cause a denial of service (daemon crash) via crafted LDAP requests.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0577">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:redhat:enterprise_linux:3"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0577</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:54.123-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9968" name="oval:org.mitre.oval:def:9968"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-064.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-064.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0308.html" xml:lang="en">RHSA-2009:0308</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=486052" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=486052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48977" xml:lang="en">cups-texttops-writeprolog-bo(48977)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the WriteProlog function in texttops in CUPS 1.1.17 on Red Hat Enterprise Linux (RHEL) 3 allows remote attackers to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2008-3640.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0578">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:ubuntu:ubuntu_linux:8.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:ubuntu:ubuntu_linux:8.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0578</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:54.183-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8931" name="oval:org.mitre.oval:def:8931"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html" xml:lang="en">SUSE-SA:2009:013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0361.html" xml:lang="en">RHSA-2009:0361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33966" xml:lang="en">33966</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021909" xml:lang="en">1021909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-727-1" xml:lang="en">USN-727-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487752" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487752</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49063" xml:lang="en">networkmanager-dbus-security-bypass(49063)</vuln:reference>
    </vuln:references>
    <vuln:summary>GNOME NetworkManager before 0.7.0.99 does not properly verify privileges for dbus (1) modify and (2) delete requests, which allows local users to change or remove the network connections of arbitrary users via unspecified vectors related to org.freedesktop.NetworkManagerUserSettings and at_console.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0579">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:0.99.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:linux-pam:linux-pam:1.0.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.1.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.2.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.2.1</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.3.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.4.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.5.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.6.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.6.1</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.6.2</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.6.3</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.7.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.7.1</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.8.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.8.1</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.9.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:0.99.10.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:1.0.0</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:1.0.1</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:1.0.2</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:1.0.3</vuln:product>
      <vuln:product>cpe:/a:linux-pam:linux-pam:1.0.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0579</vuln:cve-id>
    <vuln:published-datetime>2009-04-16T11:12:57.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-01-03T10:01:44.730-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-04-16T11:52:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=514437</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487216" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487216</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00398.html" xml:lang="en">FEDORA-2009-3204</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00420.html" xml:lang="en">FEDORA-2009-3231</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/pam-list/2009-March/msg00006.html" xml:lang="en">[pam-list] 20090309 Linux-PAM 1.0.4 released</vuln:reference>
    </vuln:references>
    <vuln:summary>Linux-PAM before 1.0.4 does not enforce the minimum password age (MINDAYS) as specified in /etc/shadow, which allows local users to bypass intended security policy and change their passwords sooner than specified.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0580">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.30"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.31"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.32"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.33"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.34"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.35"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.37"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.38"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.39"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:tomcat:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.30</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.31</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.32</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.33</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.34</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.35</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.36</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.37</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.38</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.39</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.16</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0580</vuln:cve-id>
    <vuln:published-datetime>2009-06-05T12:00:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-25T07:30:39.177-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18915" name="oval:org.mitre.oval:def:18915"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6628" name="oval:org.mitre.oval:def:6628"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9101" name="oval:org.mitre.oval:def:9101"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127420533226623&amp;w=2" xml:lang="en">HPSBMA02535</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129070310906557&amp;w=2" xml:lang="en">HPSBUX02579</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=133469267822771&amp;w=2" xml:lang="en">HPSBOV02762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136485229118404&amp;w=2" xml:lang="en">HPSBUX02860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022332" xml:lang="en">1022332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1" xml:lang="en">263529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=747840&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=747840&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=781379&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=781379&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=781382&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=781382&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-4.html" xml:lang="en">http://tomcat.apache.org/security-4.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-5.html" xml:lang="en">http://tomcat.apache.org/security-5.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-6.html" xml:lang="en">http://tomcat.apache.org/security-6.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2207" xml:lang="en">DSA-2207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:136" xml:lang="en">MDVSA-2009:136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:138" xml:lang="en">MDVSA-2009:138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:176" xml:lang="en">MDVSA-2010:176</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504045/100/0/threaded" xml:lang="en">20090603 [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504108/100/0/threaded" xml:lang="en">20090604 Re: [SECURITY] CVE-2009-0580 Apache Tomcat User enumeration vulnerability with FORM authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504125/100/0/threaded" xml:lang="en">20090605 [SECURITY] CVE-2009-0580 UPDATED Apache Tomcat User enumeration vulnerability with FORM authentication</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35196" xml:lang="en">35196</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1496" xml:lang="en">ADV-2009-1496</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1856" xml:lang="en">ADV-2009-1856</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/3056" xml:lang="en">ADV-2010-3056</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50930" xml:lang="en">tomcat-jsecuritycheck-info-disclosure(50930)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html" xml:lang="en">FEDORA-2009-11374</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html" xml:lang="en">FEDORA-2009-11352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html" xml:lang="en">FEDORA-2009-11356</vuln:reference>
    </vuln:references>
    <vuln:summary>Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0581">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:gimp:gimp"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.1:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:sun:openjdk:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.07"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.08"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.09"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.17"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gimp:gimp</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.07</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.08</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.09</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.10</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.11</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.12</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.13</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.14</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.15</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.16</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.1:beta1</vuln:product>
      <vuln:product>cpe:/a:sun:openjdk:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0581</vuln:cve-id>
    <vuln:published-datetime>2009-03-23T10:19:12.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:16.057-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10023" name="oval:org.mitre.oval:def:10023"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-003.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-19.xml" xml:lang="en">GLSA-200904-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.487438" xml:lang="en">SSA:2009-083-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1745" xml:lang="en">DSA-1745</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1769" xml:lang="en">DSA-1769</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:121" xml:lang="en">MDVSA-2009:121</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:137" xml:lang="en">MDVSA-2009:137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:162" xml:lang="en">MDVSA-2009:162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2009-003.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0339.html" xml:lang="en">RHSA-2009:0339</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502018/100/0/threaded" xml:lang="en">20090320 LittleCMS vulnerabilities (OpenJDK, Firefox, GIMP, etc. impacted)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502031/100/0/threaded" xml:lang="en">20090320 [oCERT-2009-003] LittleCMS integer errors</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34185" xml:lang="en">34185</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021870" xml:lang="en">1021870</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-744-1" xml:lang="en">USN-744-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0775" xml:lang="en">ADV-2009-0775</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487509" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49328" xml:lang="en">littlecms-unspecified-dos(49328)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-0377.html" xml:lang="en">RHSA-2009:0377</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html" xml:lang="en">FEDORA-2009-2903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html" xml:lang="en">FEDORA-2009-2910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html" xml:lang="en">FEDORA-2009-2928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html" xml:lang="en">FEDORA-2009-2970</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html" xml:lang="en">FEDORA-2009-2982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html" xml:lang="en">FEDORA-2009-2983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html" xml:lang="en">FEDORA-2009-3034</vuln:reference>
    </vuln:references>
    <vuln:summary>Memory leak in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allows context-dependent attackers to cause a denial of service (memory consumption and application crash) via a crafted image file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0582">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gnome:evolution-data-server:2.24.5"/>
        <cpe-lang:fact-ref name="cpe:/a:gnome:evolution-data-server:2.25.92"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gnome:evolution-data-server:2.24.5</vuln:product>
      <vuln:product>cpe:/a:gnome:evolution-data-server:2.25.92</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0582</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.467-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:54.467-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10081" name="oval:org.mitre.oval:def:10081"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mail.gnome.org/archives/release-team/2009-March/msg00096.html" xml:lang="en">[release-team] 20090312 Another Evolution-Data-Server freeze break</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021845" xml:lang="en">1021845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1813" xml:lang="en">DSA-1813</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:078" xml:lang="en">MDVSA-2009:078</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0354.html" xml:lang="en">RHSA-2009:0354</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0355.html" xml:lang="en">RHSA-2009:0355</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0358.html" xml:lang="en">RHSA-2009:0358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34109" xml:lang="en">34109</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0716" xml:lang="en">ADV-2009-0716</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487685" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487685</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49233" xml:lang="en">evolution-ntlmsasl-info-disclosure(49233)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00666.html" xml:lang="en">FEDORA-2009-2784</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00672.html" xml:lang="en">FEDORA-2009-2792</vuln:reference>
    </vuln:references>
    <vuln:summary>The ntlm_challenge function in the NTLM SASL authentication mechanism in camel/camel-sasl-ntlm.c in Camel in Evolution Data Server (aka evolution-data-server) 2.24.5 and earlier, and 2.25.92 and earlier 2.25.x versions, does not validate whether a certain length value is consistent with the amount of data in a challenge packet, which allows remote mail servers to read information from the process memory of a client, or cause a denial of service (client crash), via an NTLM authentication type 2 packet with a length value that exceeds the amount of packet data.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0583">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:5.50"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.05"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.07"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.54"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.56"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.57"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.61"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.62"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.63"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.7.0:beta_8"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.1.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.1</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.2</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.3.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.6.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.7.0:beta_8</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.2</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.3</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:5.50</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.05</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.07</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.0.1</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15.2</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.54</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.56</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.57</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.61</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.62</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.63</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0583</vuln:cve-id>
    <vuln:published-datetime>2009-03-23T16:00:00.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:22.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10795" name="oval:org.mitre.oval:def:10795"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=261087" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=261087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021868" xml:lang="en">1021868</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1" xml:lang="en">262288</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AUSCERT</vuln:source>
      <vuln:reference href="http://www.auscert.org.au/render.html?it=10666" xml:lang="en">ESB-2009.0259</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1746" xml:lang="en">DSA-1746</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml" xml:lang="en">GLSA-200903-37</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:095" xml:lang="en">MDVSA-2009:095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:096" xml:lang="en">MDVSA-2009:096</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0345.html" xml:lang="en">RHSA-2009:0345</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501994/100/0/threaded" xml:lang="en">20090319 rPSA-2009-0050-1 ghostscript</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34184" xml:lang="en">34184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-743-1" xml:lang="en">USN-743-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0776" xml:lang="en">ADV-2009-0776</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0777" xml:lang="en">ADV-2009-0777</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0816" xml:lang="en">ADV-2009-0816</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1708" xml:lang="en">ADV-2009-1708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487742" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487742</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49329" xml:lang="en">ghostscript-icclib-native-color-bo(49329)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2991" xml:lang="en">https://issues.rpath.com/browse/RPL-2991</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/757-1/" xml:lang="en">USN-757-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html" xml:lang="en">FEDORA-2009-2883</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html" xml:lang="en">FEDORA-2009-2885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html" xml:lang="en">FEDORA-2009-3011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html" xml:lang="en">FEDORA-2009-3031</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0584">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:cms:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:0"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:5.50"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.05"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.07"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.54"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.56"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.57"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.60"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.61"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:argyllcms:cms:1.0.3</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:0</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:5.50</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.05</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.07</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.0.1</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15.2</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.54</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.56</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.57</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.60</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.61</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0584</vuln:cve-id>
    <vuln:published-datetime>2009-03-23T16:00:00.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:28.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10544" name="oval:org.mitre.oval:def:10544"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.gentoo.org/show_bug.cgi?id=261087" xml:lang="en">http://bugs.gentoo.org/show_bug.cgi?id=261087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021868" xml:lang="en">1021868</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1" xml:lang="en">262288</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-098.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0050</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AUSCERT</vuln:source>
      <vuln:reference href="http://www.auscert.org.au/render.html?it=10666" xml:lang="en">ESB-2009.0259</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1746" xml:lang="en">DSA-1746</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-37.xml" xml:lang="en">GLSA-200903-37</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:095" xml:lang="en">MDVSA-2009:095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:096" xml:lang="en">MDVSA-2009:096</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0345.html" xml:lang="en">RHSA-2009:0345</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501994/100/0/threaded" xml:lang="en">20090319 rPSA-2009-0050-1 ghostscript</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34184" xml:lang="en">34184</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-743-1" xml:lang="en">USN-743-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0776" xml:lang="en">ADV-2009-0776</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0777" xml:lang="en">ADV-2009-0777</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0816" xml:lang="en">ADV-2009-0816</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1708" xml:lang="en">ADV-2009-1708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487744" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487744</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49327" xml:lang="en">ghostscript-icclib-bo(49327)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2991" xml:lang="en">https://issues.rpath.com/browse/RPL-2991</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/757-1/" xml:lang="en">USN-757-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00770.html" xml:lang="en">FEDORA-2009-2883</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00772.html" xml:lang="en">FEDORA-2009-2885</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00887.html" xml:lang="en">FEDORA-2009-3011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00916.html" xml:lang="en">FEDORA-2009-3031</vuln:reference>
    </vuln:references>
    <vuln:summary>icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0585">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:joe_shaw:libsoup:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:joe_shaw:libsoup:2.23.1"/>
        <cpe-lang:fact-ref name="cpe:/a:joe_shaw:libsoup:2.23.6"/>
        <cpe-lang:fact-ref name="cpe:/a:joe_shaw:libsoup:2.23.91"/>
        <cpe-lang:fact-ref name="cpe:/a:joe_shaw:libsoup:2.23.92"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:joe_shaw:libsoup:2.1</vuln:product>
      <vuln:product>cpe:/a:joe_shaw:libsoup:2.23.1</vuln:product>
      <vuln:product>cpe:/a:joe_shaw:libsoup:2.23.6</vuln:product>
      <vuln:product>cpe:/a:joe_shaw:libsoup:2.23.91</vuln:product>
      <vuln:product>cpe:/a:joe_shaw:libsoup:2.23.92</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0585</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.483-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:34.077-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9599" name="oval:org.mitre.oval:def:9599"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ocert.org/patches/2008-015/libsoup-CVE-2009-0585.diff" xml:lang="en">http://ocert.org/patches/2008-015/libsoup-CVE-2009-0585.diff</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/03/12/2" xml:lang="en">[oss-security] 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-088.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-088.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1748" xml:lang="en">DSA-1748</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:081" xml:lang="en">MDVSA-2009:081</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-015.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-015.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0344.html" xml:lang="en">RHSA-2009:0344</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501712/100/0/threaded" xml:lang="en">20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34100" xml:lang="en">34100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-737-1" xml:lang="en">USN-737-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49273" xml:lang="en">libsoup-soupmisc-bo(49273)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the soup_base64_encode function in soup-misc.c in libsoup 2.x.x before 2.2.x, and 2.x before 2.24, allows context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0586">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:gstreamer:gst-plugins-base:0.10.22"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gstreamer:gst-plugins-base:0.10.22</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0586</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:35.857-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9694" name="oval:org.mitre.oval:def:9694"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9" xml:lang="en">http://cgit.freedesktop.org/gstreamer/gst-plugins-base/commit/?id=566583e87147f774e7fc4c78b5f7e61d427e40a9</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff" xml:lang="en">http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/03/12/2" xml:lang="en">[oss-security] 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-11.xml" xml:lang="en">GLSA-200907-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:085" xml:lang="en">MDVSA-2009:085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-015.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-015.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501712/100/0/threaded" xml:lang="en">20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34100" xml:lang="en">34100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-735-1" xml:lang="en">USN-735-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49274" xml:lang="en">gstreamer-gstvorbistagaddcoverart-bo(49274)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the gst_vorbis_tag_add_coverart function (gst-libs/gst/tag/gstvorbistag.c) in vorbistag in gst-plugins-base (aka gstreamer-plugins-base) before 0.10.23 in GStreamer allows context-dependent attackers to execute arbitrary code via a crafted COVERART tag that is converted from a base64 representation, which triggers a heap-based buffer overflow.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0587">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:go-evolution:evolution-data-server:2.24.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:go-evolution:evolution-data-server:2.24.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0587</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.530-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:37.480-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11385" name="oval:org.mitre.oval:def:11385"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" xml:lang="en">SUSE-SR:2010:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ocert.org/patches/2008-015/camel-CVE-2009-0587.diff" xml:lang="en">http://ocert.org/patches/2008-015/camel-CVE-2009-0587.diff</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ocert.org/patches/2008-015/evc-CVE-2009-0587.diff" xml:lang="en">http://ocert.org/patches/2008-015/evc-CVE-2009-0587.diff</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/03/12/2" xml:lang="en">[oss-security] 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1813" xml:lang="en">DSA-1813</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:078" xml:lang="en">MDVSA-2009:078</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2008-015.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2008-015.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0354.html" xml:lang="en">RHSA-2009:0354</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0355.html" xml:lang="en">RHSA-2009:0355</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0358.html" xml:lang="en">RHSA-2009:0358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501712/100/0/threaded" xml:lang="en">20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34100" xml:lang="en">34100</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-733-1" xml:lang="en">USN-733-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0588">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:certificate_system:7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:dogtag_certificate_system"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:redhat:certificate_system:7.3</vuln:product>
      <vuln:product>cpe:/a:redhat:dogtag_certificate_system</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0588</vuln:cve-id>
    <vuln:published-datetime>2009-05-27T12:30:01.670-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-09T01:32:40.017-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1065.html" xml:lang="en">RHSA-2009:1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35104" xml:lang="en">35104</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022278" xml:lang="en">1022278</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=484828" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=484828</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=488706" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=488706</vuln:reference>
    </vuln:references>
    <vuln:summary>agent/request/op.cgi in the Registration Authority (RA) component in Red Hat Certificate System (RHCS) 7.3 and Dogtag Certificate System allows remote authenticated users to approve certificate requests queued for arbitrary agent groups via a modified request ID field.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0589">
    <vuln:cve-id>CVE-2009-0589</vuln:cve-id>
    <vuln:published-datetime>2009-03-26T06:12:11.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-26T06:12:11.563-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0590">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:::openvms"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.1c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.3a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6j"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6k"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6l"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6m"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7j"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7k"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7l"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8j"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openssl:openssl:::openvms</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.1c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.2b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.3a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.4</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6j</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6k</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6l</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6m</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta4</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta5</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta6</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7j</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7k</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7l</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8h</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0590</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:39.700-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198" name="oval:org.mitre.oval:def:10198"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6996" name="oval:org.mitre.oval:def:6996"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc" xml:lang="en">NetBSD-SA2009-008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" xml:lang="en">APPLE-SA-2009-09-10-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" xml:lang="en">openSUSE-SU-2011:0845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" xml:lang="en">SUSE-SU-2011:0847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2010/000082.html" xml:lang="en">[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124464882609472&amp;w=2" xml:lang="en">SSRT090059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=125017764422557&amp;w=2" xml:lang="en">HPSBMA02447</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127678688104458&amp;w=2" xml:lang="en">HPSBOV02540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FREEBSD</vuln:source>
      <vuln:reference href="http://security.FreeBSD.org/advisories/FreeBSD-SA-09:08.openssl.asc" xml:lang="en">FreeBSD-SA-09:08</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021905" xml:lang="en">1021905</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-258048-1" xml:lang="en">258048</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3865" xml:lang="en">http://support.apple.com/kb/HT3865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html" xml:lang="en">http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0057" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1763" xml:lang="en">DSA-1763</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:087" xml:lang="en">MDVSA-2009:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openssl.org/news/secadv_20090325.txt" xml:lang="en">http://www.openssl.org/news/secadv_20090325.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/archive/2009.php#id2009-04-08-1" xml:lang="en">http://www.php.net/archive/2009.php#id2009-04-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1335.html" xml:lang="en">RHSA-2009:1335</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502429/100/0/threaded" xml:lang="en">20090403 rPSA-2009-0057-1 m2crypto openssl openssl-scripts</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/515055/100/0/threaded" xml:lang="en">20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34256" xml:lang="en">34256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-750-1" xml:lang="en">USN-750-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2010-0019.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2010-0019.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0850" xml:lang="en">ADV-2009-0850</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1020" xml:lang="en">ADV-2009-1020</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1175" xml:lang="en">ADV-2009-1175</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1220" xml:lang="en">ADV-2009-1220</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1548" xml:lang="en">ADV-2009-1548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0528" xml:lang="en">ADV-2010-0528</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/3126" xml:lang="en">ADV-2010-3126</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49431" xml:lang="en">openssl-asn1-stringprintex-dos(49431)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://kb.bluecoat.com/index?page=content&amp;id=SA50" xml:lang="en">https://kb.bluecoat.com/index?page=content&amp;id=SA50</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html" xml:lang="en">[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.0.6a has been released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html" xml:lang="en">[syslog-ng-announce] 20110110 syslog-ng Premium Edition 3.2.1a has been released</vuln:reference>
    </vuln:references>
    <vuln:summary>The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0591">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8j"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8j</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0591</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:01.920-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:55.600-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc" xml:lang="en">NetBSD-SA2009-008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" xml:lang="en">APPLE-SA-2009-09-10-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124464882609472&amp;w=2" xml:lang="en">SSRT090059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127678688104458&amp;w=2" xml:lang="en">HPSBOV02540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021907" xml:lang="en">1021907</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3865" xml:lang="en">http://support.apple.com/kb/HT3865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html" xml:lang="en">http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openssl.org/news/secadv_20090325.txt" xml:lang="en">http://www.openssl.org/news/secadv_20090325.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/archive/2009.php#id2009-04-08-1" xml:lang="en">http://www.php.net/archive/2009.php#id2009-04-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34256" xml:lang="en">34256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0850" xml:lang="en">ADV-2009-0850</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1020" xml:lang="en">ADV-2009-1020</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1175" xml:lang="en">ADV-2009-1175</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1548" xml:lang="en">ADV-2009-1548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49432" xml:lang="en">openssl-cmsverify-security-bypass(49432)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://kb.bluecoat.com/index?page=content&amp;id=SA50" xml:lang="en">https://kb.bluecoat.com/index?page=content&amp;id=SA50</vuln:reference>
    </vuln:references>
    <vuln:summary>The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0592">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.1a"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2a"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2d"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2e"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2f"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2g"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2h:rc3b"/>
        <cpe-lang:fact-ref name="cpe:/a:pnphpbb:pnphpbb2:1.2i"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.0</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.1</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.1a</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2a</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2d</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2e</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2f</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2g</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2h:rc3b</vuln:product>
      <vuln:product>cpe:/a:pnphpbb:pnphpbb2:1.2i</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0592</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:04.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33103" xml:lang="en">33103</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7658" xml:lang="en">7658</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple directory traversal vulnerabilities in PNphpBB2 1.2i and earlier allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ModName parameter to (1) admin_words.php, (2) admin_groups_reapir.php, (3) admin_smilies.php, (4) admin_ranks.php, (5) admin_styles.php, and (6) admin_users.php in admin/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0593">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:plxwebdev:plx_auto_reminder:3.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:plxwebdev:plx_auto_reminder:3.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0593</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:04.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.107-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33106" xml:lang="en">33106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7663" xml:lang="en">7663</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in members.php in plx Auto Reminder 3.7 allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a newar action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0594">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apmuthu:phpskelsite:1.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apmuthu:phpskelsite:1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0594</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:04.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.153-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33092" xml:lang="en">33092</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7648" xml:lang="en">7648</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.php in phpSkelSite 1.4 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0595">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpskelsite:phpskelsite:1.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpskelsite:phpskelsite:1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0595</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:05.000-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33092" xml:lang="en">33092</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7648" xml:lang="en">7648</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in skysilver/login.tpl.php in phpSkelSite 1.4, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the theme parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0596">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpskelsite:phpskelsite:1.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpskelsite:phpskelsite:1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0596</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:05.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33092" xml:lang="en">33092</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7648" xml:lang="en">7648</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in skysilver/login.tpl.php in phpSkelSite 1.4, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the TplSuffix parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0597">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:w3b_cms:aka_w3blabor_cms:3.3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:w3b_cms:aka_w3blabor_cms:3.3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0597</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:05.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://forum.w3bcms.de/viewtopic.php?f=5&amp;t=256" xml:lang="en">http://forum.w3bcms.de/viewtopic.php?f=5&amp;t=256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33082" xml:lang="en">33082</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7640" xml:lang="en">7640</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in admin/index.php in w3b>cms (aka w3blabor CMS) before 3.4.0, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the benutzername parameter (aka Username field) in a login action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0598">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpmesfilms:phpmesfilms:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:phpmesfilms:phpmesfilms:1.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpmesfilms:phpmesfilms:1.0</vuln:product>
      <vuln:product>cpe:/a:phpmesfilms:phpmesfilms:1.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0598</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T12:30:05.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33105" xml:lang="en">33105</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7660" xml:lang="en">7660</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in PhpMesFilms 1.0 and 1.8 allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0599">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.7</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0599</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:51.030-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14732" name="oval:org.mitre.oval:def:14732"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9677" name="oval:org.mitre.oval:def:9677"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0040" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0313.html" xml:lang="en">RHSA-2009:0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501763/100/0/threaded" xml:lang="en">20090312 rPSA-2009-0040-1 tshark wireshark</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33690" xml:lang="en">33690</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021697" xml:lang="en">1021697</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0370" xml:lang="en">ADV-2009-0370</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2009-01.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2009-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2590" xml:lang="en">https://bugs.wireshark.org/bugzilla/attachment.cgi?id=2590</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2984" xml:lang="en">https://issues.rpath.com/browse/RPL-2984</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00652.html" xml:lang="en">FEDORA-2009-1877</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0600">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.6"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.6a"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.7"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.8"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.6</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.6a</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.7</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0600</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:03.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:53.153-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10853" name="oval:org.mitre.oval:def:10853"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15041" name="oval:org.mitre.oval:def:15041"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-082.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0040" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0313.html" xml:lang="en">RHSA-2009:0313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501763/100/0/threaded" xml:lang="en">20090312 rPSA-2009-0040-1 tshark wireshark</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33690" xml:lang="en">33690</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021697" xml:lang="en">1021697</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0370" xml:lang="en">ADV-2009-0370</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2009-01.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2009-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1937" xml:lang="en">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2984" xml:lang="en">https://issues.rpath.com/browse/RPL-2984</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00652.html" xml:lang="en">FEDORA-2009-1877</vuln:reference>
    </vuln:references>
    <vuln:summary>Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0601">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:0.99.8"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:wireshark:wireshark:1.0.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:apple:mac_os_x"/>
          <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd"/>
          <cpe-lang:fact-ref name="cpe:/o:linux:linux"/>
          <cpe-lang:fact-ref name="cpe:/o:netbsd:netbsd"/>
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wireshark:wireshark:0.99.8</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.0</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.1</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.2</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.3</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.4</vuln:product>
      <vuln:product>cpe:/a:wireshark:wireshark:1.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0601</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:03.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:54.983-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" xml:lang="en">SUSE-SR:2009:005</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0040" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501763/100/0/threaded" xml:lang="en">20090312 rPSA-2009-0040-1 tshark wireshark</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33690" xml:lang="en">33690</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021697" xml:lang="en">1021697</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0370" xml:lang="en">ADV-2009-0370</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.wireshark.org/security/wnpa-sec-2009-01.html" xml:lang="en">http://www.wireshark.org/security/wnpa-sec-2009-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3150" xml:lang="en">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3150</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.rpath.com/browse/RPL-2984" xml:lang="en">https://issues.rpath.com/browse/RPL-2984</vuln:reference>
    </vuln:references>
    <vuln:summary>Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0602">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:wikkitikkitavi:wikkitikkitavi:1.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:wikkitikkitavi:wikkitikkitavi:1.11</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0602</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:03.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33647" xml:lang="en">33647</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48571" xml:lang="en">wikkitikkitavi-upload-file-upload(48571)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7998" xml:lang="en">7998</vuln:reference>
    </vuln:references>
    <vuln:summary>Unrestricted file upload vulnerability in upload.php in WikkiTikkiTavi 1.11 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in img/.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0603">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:link_module:5.x-2.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:drupal:5.10"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:drupal:link_module:5.x-2.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0603</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:03.157-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:55.707-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-02/0036.html" xml:lang="en">20090205 Drupal Link Module XSS Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33642" xml:lang="en">33642</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48553" xml:lang="en">link-description-xss(48553)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in index.php in the Link module 5.x-2.5 for Drupal 5.10 allows remote authenticated users, with "administer content types" privileges, to inject arbitrary web script or HTML via the description parameter (aka the Help field).  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0604">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php_director:php_director:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php_director:php_director:0.21"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php_director:php_director:0.2</vuln:product>
      <vuln:product>cpe:/a:php_director:php_director:0.21</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0604</vuln:cve-id>
    <vuln:published-datetime>2009-02-16T15:30:03.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.670-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33694" xml:lang="en">33694</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0379" xml:lang="en">ADV-2009-0379</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8014" xml:lang="en">8014</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in index.php in PHP Director 0.21 and earlier allows remote attackers to execute arbitrary SQL commands via the searching parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0605">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.2.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.4.36.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.2.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.4.36.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0605</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-03-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-18T08:54:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=9be260a646bf76fa418ee519afa10196b3164681" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git;a=commit;h=9be260a646bf76fa418ee519afa10196b3164681</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33758" xml:lang="en">33758</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0606">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openhandsetalliance:android_sdk:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openhandsetalliance:android_sdk:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0606</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:55.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500753/100/0/threaded" xml:lang="en">20090208 rooting your own phone: android security</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33695" xml:lang="en">33695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48840" xml:lang="en">android-dynamic-linker-privilege-escalation(48840)</vuln:reference>
    </vuln:references>
    <vuln:summary>The link_image function in linker/linker.c in the dynamic linker in Bionic in Open Handset Alliance Android 1.0 on the T-Mobile G1 phone does not properly handle file descriptors 0, 1, and 2 for a setgid program, which allows local users to create arbitrary files owned by certain groups, possibly a related issue to CVE-2002-0820.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0607">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openhandsetalliance:android_sdk:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openhandsetalliance:android_sdk:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0607</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:56.093-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500753/100/0/threaded" xml:lang="en">20090208 rooting your own phone: android security</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33695" xml:lang="en">33695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48841" xml:lang="en">android-malloc-overflow(48841)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in malloc_leak.c in Bionic in Open Handset Alliance Android 1.0 have unknown impact and attack vectors, related to the (1) chk_calloc and (2) leak_calloc functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0608">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:android:android_sdk:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:android:android_sdk:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0608</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:05.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:56.653-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500753/100/0/threaded" xml:lang="en">20090208 rooting your own phone: android security</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33695" xml:lang="en">33695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48842" xml:lang="en">android-showlog-bo(48842)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the showLog function in fake_log_device.c in liblog in Open Handset Alliance Android 1.0 allows attackers to trigger a buffer overflow and possibly have unspecified other impact by sending a large number of input lines.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0609">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:6.0:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:6.1:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:6.2:enterprise"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:java_system_directory_server:6.3:enterprise"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:java_system_directory_server:6.0:enterprise</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_directory_server:6.1:enterprise</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_directory_server:6.2:enterprise</vuln:product>
      <vuln:product>cpe:/a:sun:java_system_directory_server:6.3:enterprise</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0609</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:06.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-18T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-18T11:22:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-125276-08-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-125276-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-251086-1" xml:lang="en">251086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33761" xml:lang="en">33761</vuln:reference>
    </vuln:references>
    <vuln:summary>Sun Java System Directory Proxy Server in Sun Java System Directory Server Enterprise Edition 6.0 through 6.3, when a JDBC data source is used, does not properly handle (1) a long value in an ADD or (2) long string attributes, which allows remote attackers to cause a denial of service (JDBC backend outage) via crafted LDAP requests.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0610">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dminnich:simple_php_news:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dminnich:simple_php_news:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0610</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:06.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-18T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-18T11:49:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:summary>Multiple static code injection vulnerabilities in post.php in Simple PHP News 1.0 final allow remote attackers to inject arbitrary PHP code into news.txt via the (1) title or (2) date parameter, and then execute the code via a direct request to display.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0611">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:novell:open_enterprise_server:1.x"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novell:open_enterprise_server:1.x</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0611</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:06.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:55.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/0902-exploits/nqfs-xss.txt" xml:lang="en">http://packetstormsecurity.org/0902-exploits/nqfs-xss.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33708" xml:lang="en">33708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021695" xml:lang="en">1021695</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0421" xml:lang="en">ADV-2009-0421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48619" xml:lang="en">quickfinderserver-multiple-xss(48619)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in qfsearch/AdminServlet in QuickFinder Server in Novell Open Enterprise Server 1.x allow remote attackers to inject arbitrary web script or HTML via (1) the siteloc parameter in a displayaddsite action, the site parameter in a (2) generalproperties or (3) clusterserviceproperties action, (4) the adminurl parameter in a global action, or (5) the print-list parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0612">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:interscan_web_security_suite:2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:interscan_web_security_suite:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:interscan_web_security_virtual_appliance:3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:trendmicro:interscan_web_security_suite:2.5</vuln:product>
      <vuln:product>cpe:/a:trendmicro:interscan_web_security_suite:3.1</vuln:product>
      <vuln:product>cpe:/a:trendmicro:interscan_web_security_virtual_appliance:3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0612</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:06.077-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:42.623-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500760/100/0/threaded" xml:lang="en">20090209 Trend micro - IWSVA/IWSS - Authorization module password leak</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33687" xml:lang="en">33687</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021716" xml:lang="en">1021716</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48681" xml:lang="en">interscan-proxyauthorization-info-disc(48681)</vuln:reference>
    </vuln:references>
    <vuln:summary>Trend Micro InterScan Web Security Virtual Appliance (IWSVA) 3.x and InterScan Web Security Suite (IWSS) 3.x, when basic authorization is enabled on the standalone proxy, forwards the Proxy-Authorization header from Windows Media Player, which allows remote web servers to obtain credentials by offering a media stream and then capturing this header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0613">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:interscan_web_security_suite:3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:trendmicro:interscan_web_security_suite:3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0613</vuln:cve-id>
    <vuln:published-datetime>2009-02-17T12:30:06.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:42.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021694" xml:lang="en">1021694</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.trendmicro.com/ftp/documentation/readme/iwss_31_win_en_readme_CP_1237_EN.txt" xml:lang="en">http://www.trendmicro.com/ftp/documentation/readme/iwss_31_win_en_readme_CP_1237_EN.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0369" xml:lang="en">ADV-2009-0369</vuln:reference>
    </vuln:references>
    <vuln:summary>Trend Micro InterScan Web Security Suite (IWSS) 3.1 before build 1237 allows remote authenticated Auditor and Report Only users to bypass intended permission settings, and modify the system configuration, via requests to unspecified JSP pages.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0614">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_meetingplace_web_conferencing:7.0%281%29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:unified_meetingplace_web_conferencing:7.0%281%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0614</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-08T15:21:06.283-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2018-11-07T10:14:51.640-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc86.shtml" xml:lang="en">20090225 Cisco Unified MeetingPlace Web Conferencing Authentication Bypass Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33901" xml:lang="en">33901</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48888" xml:lang="en">cisco-meetingplace-unauth-access(48888)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Web Server in Cisco Unified MeetingPlace Web Conferencing 6.0 before 6.0(517.0) (aka 6.0 MR4) and 7.0 before 7.0(2) (aka 7.0 MR1) allows remote attackers to bypass authentication and obtain administrative access via a crafted URL.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0615">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_control_engine_device_manager:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_control_engine_device_manager:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:application_control_engine_device_manager:1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:application_control_engine_device_manager:1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0615</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:48.920-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml" xml:lang="en">20090225 Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33903" xml:lang="en">33903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021770" xml:lang="en">1021770</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in Cisco Application Networking Manager (ANM) before 2.0 and Application Control Engine (ACE) Device Manager before A3(2.1) allows remote authenticated users to read or modify arbitrary files via unspecified vectors, related to "invalid directory permissions."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0616">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0616</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:49.093-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml" xml:lang="en">20090225 Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33903" xml:lang="en">33903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021771" xml:lang="en">1021771</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Application Networking Manager (ANM) before 2.0 uses default usernames and passwords, which makes it easier for remote attackers to access the application, or cause a denial of service via configuration changes, related to "default user credentials during installation."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0617">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0617</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.077-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:49.280-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml" xml:lang="en">20090225 Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33903" xml:lang="en">33903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021771" xml:lang="en">1021771</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco Application Networking Manager (ANM) before 2.0 uses a default MySQL root password, which makes it easier for remote attackers to execute arbitrary operating-system commands or change system files.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0618">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:application_networking_manager:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.1</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:1.2</vuln:product>
      <vuln:product>cpe:/a:cisco:application_networking_manager:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0618</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.093-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:49.500-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc84.shtml" xml:lang="en">20090225 Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33903" xml:lang="en">33903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021772" xml:lang="en">1021772</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Java agent in Cisco Application Networking Manager (ANM) before 2.0 Update A allows remote attackers to gain privileges, and cause a denial of service (service outage) by stopping processes, or obtain sensitive information by reading configuration files.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0619">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:session_border_controller:3.0%281%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:session_border_controller"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:session_border_controller:3.0%281%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0619</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.053-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a80faa.shtml" xml:lang="en">20090304 Cisco 7600 Series Router Session Border Controller Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33975" xml:lang="en">33975</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021787" xml:lang="en">1021787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49055" xml:lang="en">cisco-sbc-dos(49055)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Session Border Controller (SBC) before 3.0(2) for Cisco 7600 series routers allows remote attackers to cause a denial of service (SBC card reload) via crafted packets to TCP port 2000.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0620">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:6500"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:7600"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cisco:application_control_engine_module:0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:application_control_engine_module:0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0620</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-27T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-27T09:42:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.1) uses default (1) usernames and (2) passwords for (a) the administrator and (b) web management, which makes it easier for remote attackers to perform configuration changes or obtain operating-system access.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0621">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0621</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-27T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-27T09:46:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:summary>Cisco ACE 4710 Application Control Engine Appliance before A1(8a) uses default (1) usernames and (2) passwords for (a) the administrator, (b) web management, and (c) device management, which makes it easier for remote attackers to perform configuration changes to the Device Manager and other components, or obtain operating-system access.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0622">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:1.0"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:1.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:1.0</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0622</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.157-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-27T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-27T09:58:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8a) allows remote authenticated users to execute arbitrary operating-system commands through a command line interface (CLI).</vuln:summary>
  </entry>
  <entry id="CVE-2009-0623">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a3%281.0%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a3%282.0%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:a2%281.1%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:a2%281.2%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:6500"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710:a3%281.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:ace_4710:a3%282.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:a2%281.1%29</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:a2%281.2%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0623</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-27T10:07:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0624">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:1.0"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:1.1"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:1.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a1%282.0%29"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a1%288.0%29"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a3%281.0%29"/>
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a3%282.0%29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710:a1%282.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:ace_4710:a1%288.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:ace_4710:a3%281.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:ace_4710:a3%282.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:1.0</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:1.1</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0624</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:50.127-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021769" xml:lang="en">1021769</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0625">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710:a1%282.0%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module:a2%281.1%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:6500"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst:7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710:a1%282.0%29</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module:a2%281.1%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0625</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-03T02:04:50.343-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33900" xml:lang="en">33900</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021769" xml:lang="en">1021769</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.2) and Cisco ACE 4710 Application Control Engine Appliance before A1(8.0) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv3 packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0626">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ya"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3va</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ya</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0626</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:01.953-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6919" name="oval:org.mitre.oval:def:6919"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021896" xml:lang="en">1021896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" xml:lang="en">20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34239" xml:lang="en">34239</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49425" xml:lang="en">ios-sslvpn-dos(49425)</vuln:reference>
    </vuln:references>
    <vuln:summary>The SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (device reload or hang) via a crafted HTTPS packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0627">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:cisco:nx-os:4.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:nexus_5000"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:nexus_7000"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:nexus_5000</vuln:product>
      <vuln:product>cpe:/h:cisco:nexus_7000</vuln:product>
      <vuln:product>cpe:/o:cisco:nx-os:4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0627</vuln:cve-id>
    <vuln:published-datetime>2009-09-08T19:30:00.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-09-09T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-09-09T14:04:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml" xml:lang="en">20090908 TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022847" xml:lang="en">1022847</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco NX-OS before 4.0(1a)N2(1), when running on Nexus 5000 platforms, allows remote attackers to cause a denial of service (crash) via an unspecified "sequence of TCP packets" related to "TCP State manipulation," possibly related to separate attacks against CVE-2008-4609.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0628">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xk"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:b</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:eu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jea</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jec</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jl</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:va</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xs</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xy</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ya</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ym</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ys</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yt</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yz</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jma</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:md</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:mr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:sw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xk</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0628</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:01.967-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.827-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12092" name="oval:org.mitre.oval:def:12092"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021896" xml:lang="en">1021896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90424.shtml" xml:lang="en">20090325 Cisco IOS Software WebVPN and SSLVPN Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34239" xml:lang="en">34239</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49427" xml:lang="en">ios-sslvpn-tcbleak-dos(49427)</vuln:reference>
    </vuln:references>
    <vuln:summary>Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0629">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2by"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ewa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2irb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2l"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2rc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sbc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2so"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sra"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2src"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2su"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sva"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sve"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2za"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ze"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281c%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29mr1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xb2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283a%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283d%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%285%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%285b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%286%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%286%29t1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%287%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%287a%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%288%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%289%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2823%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_s:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_t:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_xr:12.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2by</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ewa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2irb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2l</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2rc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sbc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2so</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sra</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2src</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2su</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sva</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sve</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2za</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ze</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281c%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29mr1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xb2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283a%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283d%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%285%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%285b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%286%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%286%29t1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%287%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%287a%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%288%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%289%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2823%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_s:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_t:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_xr:12.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0629</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:01.983-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-29T11:30:22.210-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2017-08-28T12:32:34.027-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021903" xml:lang="en">1021903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904cb.shtml" xml:lang="en">20090325 Cisco IOS Software Multiple Features Crafted TCP Sequence Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34238" xml:lang="en">34238</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49420" xml:lang="en">ios-tcp-dos(49420)</vuln:reference>
    </vuln:references>
    <vuln:summary>The (1) Airline Product Set (aka ALPS), (2) Serial Tunnel Code (aka STUN), (3) Block Serial Tunnel Code (aka BSTUN), (4) Native Client Interface Architecture (NCIA) support, (5) Data-link switching (aka DLSw), (6) Remote Source-Route Bridging (RSRB), (7) Point to Point Tunneling Protocol (PPTP), (8) X.25 for Record Boundary Preservation (RBP), (9) X.25 over TCP (XOT), and (10) X.25 Routing features in Cisco IOS 12.2 and 12.4 allows remote attackers to cause a denial of service (device reload) via a series of crafted TCP packets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0630">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0st"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0w"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1aa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ax"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ay"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1az"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1e"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ev"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1gb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2by"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ewa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ira"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2irb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sbc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2scb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2se"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sed"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2see"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sef"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2so"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sra"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2src"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ste"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2su"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sva"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sve"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xna"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xnb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2za"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ze"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ya"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.0</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0st</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0w</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1aa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ax</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ay</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1az</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1e</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ev</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1gb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2by</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ewa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ira</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2irb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sbc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2scb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2se</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sed</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2see</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sef</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2so</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sra</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2src</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ste</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2su</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sva</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sve</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xna</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xnb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2za</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ze</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3va</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ya</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0630</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.017-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.363-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021897" xml:lang="en">1021897</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c6.shtml" xml:lang="en">20090325 Cisco IOS Software Multiple Features IP Sockets Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34242" xml:lang="en">34242</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49418" xml:lang="en">ios-ipsockets-dos(49418)</vuln:reference>
    </vuln:references>
    <vuln:summary>The (1) Cisco Unified Communications Manager Express; (2) SIP Gateway Signaling Support Over Transport Layer Security (TLS) Transport; (3) Secure Signaling and Media Encryption; (4) Blocks Extensible Exchange Protocol (BEEP); (5) Network Admission Control HTTP Authentication Proxy; (6) Per-user URL Redirect for EAPoUDP, Dot1x, and MAC Authentication Bypass; (7) Distributed Director with HTTP Redirects; and (8) TCP DNS features in Cisco IOS 12.0 through 12.4 do not properly handle IP sockets, which allows remote attackers to cause a denial of service (outage or resource consumption) via a series of crafted TCP packets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0631">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0st"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0w"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1aa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ax"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ay"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1az"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1e"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ev"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1gb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2by"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ewa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ira"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2irb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sbc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2scb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2se"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sed"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2see"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sef"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2so"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sra"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2src"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ste"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2su"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sva"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sve"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xna"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xnb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2za"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ze"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ya"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.0</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0st</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0w</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1aa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ax</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ay</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1az</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1e</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ev</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1gb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2by</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ewa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ira</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2irb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sbc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2scb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2se</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sed</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2see</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sef</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2so</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sra</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2src</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ste</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2su</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sva</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sve</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xna</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xnb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2za</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ze</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3va</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ya</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0631</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T11:16:24.047-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:55.920-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6720" name="oval:org.mitre.oval:def:6720"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90426.shtml" xml:lang="en">20090325 Cisco IOS Software Multiple Features Crafted UDP Packet Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34245" xml:lang="en">34245</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021904" xml:lang="en">1021904</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49419" xml:lang="en">ios-udp-dos(49419)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when configured with (1) IP Service Level Agreements (SLAs) Responder, (2) Session Initiation Protocol (SIP), (3) H.323 Annex E Call Signaling Transport, or (4) Media Gateway Control Protocol (MGCP) allows remote attackers to cause a denial of service (blocked input queue on the inbound interface) via a crafted UDP packet.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0632">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.2%283%29sr1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.2%283%29sr2b"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.2%283%29sr3"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.2%283%29sr4"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.3%281%29sr.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.3%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:4.3%282%29sr1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%282a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%282b%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%283%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%283a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%283c%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:5.1%283d%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.0%281a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%281%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%281a%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%282%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%282%29su1"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:6.1%283%29"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_communications_manager:7.0%281%29"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.2</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.2%283%29sr1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.2%283%29sr2b</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.2%283%29sr3</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.2%283%29sr4</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.3</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.3%281%29sr.1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.3%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:4.3%282%29sr1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%282a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%282b%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%283%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%283a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%283c%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:5.1%283d%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.0%281a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%281%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%281a%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%282%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%282%29su1</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:6.1%283%29</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:7.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_communications_manager:7.0%281%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0632</vuln:cve-id>
    <vuln:published-datetime>2009-03-12T11:20:49.750-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_applied_mitigation_bulletin09186a0080a86434.html" xml:lang="en">20090311 Identifying and Mitigating Exploitation of the Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a8643c.shtml" xml:lang="en">20090311 Cisco Unified Communications Manager IP Phone Personal Address Book Synchronizer Privilege Escalation Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34082" xml:lang="en">34082</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021839" xml:lang="en">1021839</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0675" xml:lang="en">ADV-2009-0675</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49196" xml:lang="en">cucm-pab-privilege-escalation(49196)</vuln:reference>
    </vuln:references>
    <vuln:summary>The IP Phone Personal Address Book (PAB) Synchronizer feature in Cisco Unified Communications Manager (aka CUCM, formerly CallManager) 4.1, 4.2 before 4.2(3)SR4b, 4.3 before 4.3(2)SR1b, 5.x before 5.1(3e), 6.x before 6.1(3), and 7.0 before 7.0(2) sends privileged directory-service account credentials to the client in cleartext, which allows remote attackers to modify the CUCM configuration and perform other privileged actions by intercepting these credentials, and then using them in requests unrelated to the intended synchronization task, as demonstrated by (1) DC Directory account credentials in CUCM 4.x and (2) TabSyncSysUser account credentials in CUCM 5.x through 7.x.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0633">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xk"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:b</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:eu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jea</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jec</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jl</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:va</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xs</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xy</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ya</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ym</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ys</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yt</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yz</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jma</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:md</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:mr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:sw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xk</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0633</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.030-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.013-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12290" name="oval:org.mitre.oval:def:12290"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021898" xml:lang="en">1021898</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" xml:lang="en">20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34241" xml:lang="en">34241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" xml:lang="en">ios-mobile-dos(49424)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via MIPv6 packets, aka Bug ID CSCsm97220.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0634">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.3:yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jmc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:cisco_ios:12.4:xk"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:b</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:bw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:eu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jea</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jec</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jl</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:va</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xs</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:xy</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ya</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yh</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yi</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ym</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yq</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:ys</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yt</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yu</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.3:yz</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:ja</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jk</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jma</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jmc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:jx</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:md</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:mr</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:sw</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:t</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xa</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xb</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xc</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xd</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xe</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xf</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xg</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xj</vuln:product>
      <vuln:product>cpe:/o:cisco:cisco_ios:12.4:xk</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0634</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.063-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.090-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12043" name="oval:org.mitre.oval:def:12043"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021898" xml:lang="en">1021898</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a9042f.shtml" xml:lang="en">20090325 Cisco IOS Software Mobile IP and Mobile IPv6 Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34241" xml:lang="en">34241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49424" xml:lang="en">ios-mobile-dos(49424)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49585" xml:lang="en">ios-mobile-ha-dos(49585)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple unspecified vulnerabilities in the home agent (HA) implementation in the (1) Mobile IP NAT Traversal feature and (2) Mobile IPv6 subsystem in Cisco IOS 12.3 through 12.4 allow remote attackers to cause a denial of service (input queue wedge and interface outage) via an ICMP packet, aka Bug ID CSCso05337.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0635">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ya"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ya</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0635</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.077-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.740-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90459.shtml" xml:lang="en">20090325 Cisco IOS cTCP Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34246" xml:lang="en">34246</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021895" xml:lang="en">1021895</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49417" xml:lang="en">ios-ctcp-dos(49417)</vuln:reference>
    </vuln:references>
    <vuln:summary>Memory leak in the Cisco Tunneling Control Protocol (cTCP) encapsulation feature in Cisco IOS 12.4, when an Easy VPN (aka EZVPN) server is enabled, allows remote attackers to cause a denial of service (memory consumption and device crash) via a sequence of TCP packets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0636">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0st"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0w"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0wx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.0xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1aa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ax"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ay"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1az"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1db"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1dc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1e"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1eu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ev"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1gb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.1yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2by"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ewa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ira"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2irb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sbc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2scb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2se"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sed"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2see"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sef"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2seg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2so"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sra"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2src"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ste"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2su"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sva"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sve"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xna"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xnb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2za"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ze"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jea"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jeb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jec"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3va"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.3yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ya"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.0</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0st</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0w</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0wx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.0xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1aa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ax</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ay</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1az</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1db</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1dc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1e</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1eu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ev</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1gb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.1yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2by</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ewa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ira</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2irb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sbc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2scb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2se</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sed</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2see</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sef</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2seg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2so</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sra</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2src</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ste</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2su</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sva</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sve</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xna</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xnb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2za</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ze</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jea</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jeb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jec</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3va</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.3yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ya</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0636</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.093-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.817-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021902" xml:lang="en">1021902</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c0.shtml" xml:lang="en">20090325 Cisco IOS Software Session Initiation Protocol Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34243" xml:lang="en">34243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49421" xml:lang="en">ios-sip-dos(49421)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Cisco IOS 12.0 through 12.4, when SIP voice services are enabled, allows remote attackers to cause a denial of service (device crash) via a valid SIP message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0637">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2b"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2by"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2bz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2cz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2da"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2dx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ew"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ewa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ex"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ey"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ez"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2fz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2irb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ixg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2l"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2mc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2rc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2s"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sbc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sca"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sga"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2so"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sra"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2srb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2src"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2su"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sva"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2svd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sve"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sxf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2sz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2tpc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xi"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xs"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ye"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ym"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yo"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yq"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ys"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2yz"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2za"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2ze"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zh"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zu"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.2zya"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%281c%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29mr1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t3"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29t4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%282%29xb2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283a%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%283d%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%284%29t2"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%285%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%285b%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%286%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%286%29t1"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%287%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%287a%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%288%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%289%29t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4%2823%29"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4ja"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jda"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jma"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jmb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4jx"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4md"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4mr"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4sw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4t"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xa"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xb"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xc"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xd"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xe"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xf"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xg"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xj"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xk"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xl"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xm"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xn"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xp"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xt"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xv"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xw"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios:12.4xy"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_s:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_t:12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:cisco:ios_xr:12.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:cisco:ios:12.2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2b</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2by</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2bz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2cz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2da</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2dx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ew</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ewa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ex</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ey</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ez</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2fz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2irb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ixg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2l</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2mc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2rc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2s</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sbc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sca</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sga</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2so</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sra</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2srb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2src</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2su</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sva</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2svd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sve</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sxf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2sz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2tpc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xi</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xs</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ye</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ym</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yo</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yq</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ys</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2yz</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2za</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2ze</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zh</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zu</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.2zya</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%281c%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29mr1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t3</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29t4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%282%29xb2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283a%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%283d%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%284%29t2</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%285%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%285b%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%286%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%286%29t1</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%287%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%287a%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%288%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%289%29t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4%2823%29</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4ja</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jda</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jma</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jmb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4jx</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4md</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4mr</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4sw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4t</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xa</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xb</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xc</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xd</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xe</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xf</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xg</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xj</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xk</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xl</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xm</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xn</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xp</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xt</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xv</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xw</vuln:product>
      <vuln:product>cpe:/o:cisco:ios:12.4xy</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_s:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_t:12.4</vuln:product>
      <vuln:product>cpe:/o:cisco:ios_xr:12.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0637</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.127-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-29T11:14:21.607-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2017-08-28T12:30:20.227-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021899" xml:lang="en">1021899</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml" xml:lang="en">http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml" xml:lang="en">20090325 Cisco IOS Software Secure Copy Privilege Escalation Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34247" xml:lang="en">34247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0851" xml:lang="en">ADV-2009-0851</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49423" xml:lang="en">ios-scp-priv-escalation(49423)</vuln:reference>
    </vuln:references>
    <vuln:summary>The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0638">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:2.1_%280.208%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:2.2"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:2.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:2.3"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:2.3%281%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.1"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.1%285%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.1%286%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.2"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.2%281%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.2%282%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:3.2%283%29"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:4.0"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:firewall_services_module:4.0%284%29"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:firewall_services_module:2.1_%280.208%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:2.2</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:2.2%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:2.3</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:2.3%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.1</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.1%285%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.1%286%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.2</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.2%281%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.2%282%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:3.2%283%29</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:4.0</vuln:product>
      <vuln:product>cpe:/h:cisco:firewall_services_module:4.0%284%29</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0638</vuln:cve-id>
    <vuln:published-datetime>2009-08-21T07:02:41.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:56.973-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022747" xml:lang="en">1022747</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080af0d1d.shtml" xml:lang="en">20090819 Firewall Services Module Crafted ICMP Message Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/36085" xml:lang="en">36085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2329" xml:lang="en">ADV-2009-2329</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/52591" xml:lang="en">cisco-fwsm-icmp-dos(52591)</vuln:reference>
    </vuln:references>
    <vuln:summary>The Cisco Firewall Services Module (FWSM) 2.x, 3.1 before 3.1(16), 3.2 before 3.2(13), and 4.0 before 4.0(6) for Cisco Catalyst 6500 switches and Cisco 7600 routers allows remote attackers to cause a denial of service (traffic-handling outage) via a series of malformed ICMP messages.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0639">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phpyabs:phpyabs:0.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phpyabs:phpyabs:0.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0639</vuln:cve-id>
    <vuln:published-datetime>2009-02-18T11:30:00.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.153-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33670" xml:lang="en">33670</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0361" xml:lang="en">ADV-2009-0361</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8005" xml:lang="en">8005</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP remote file inclusion vulnerability in moduli/libri/index.php in phpyabs 0.1.2 allows remote attackers to execute arbitrary PHP code via a URL in the Azione parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0640">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:swannsecurity:dvr4-securanet:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:swannsecurity:dvr4-securanet:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0640</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T01:47:48.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:57.403-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstorm.linuxsecurity.com/0902-exploits/cctv-disclose.txt" xml:lang="en">http://packetstorm.linuxsecurity.com/0902-exploits/cctv-disclose.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500789/100/0/threaded" xml:lang="en">20090210 Remote Authentication Bypass - Swann DVR4 SecuraNet (possibly DVR9 as well)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33716" xml:lang="en">33716</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the administrative web server in Swann DVR4-SecuraNet allows remote attackers to read arbitrary files via a .. (dot dot) in the URI, as demonstrated by reading the vy_netman.cfg file that contains passwords.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0641">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0:beta_4"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0:current"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0-release"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0_beta4"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.0_releng"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.1"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.1:rc1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0:beta_4</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0:current</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0-release</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0_beta4</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.0_releng</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.1</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.1:rc1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0641</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T01:47:48.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-16"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://lists.grok.org.uk/pipermail/full-disclosure/2009-February/067954.html" xml:lang="en">20090214 FreeBSD zeroday</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>FREEBSD</vuln:source>
      <vuln:reference href="http://security.freebsd.org/advisories/FreeBSD-SA-09:05.telnetd.asc" xml:lang="en">FreeBSD-SA-09:05</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33777" xml:lang="en">33777</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48780" xml:lang="en">freebsd-telnet-ldpreload-code-execution(48780)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8055" xml:lang="en">8055</vuln:reference>
    </vuln:references>
    <vuln:summary>sys_term.c in telnetd in FreeBSD 7.0-RELEASE and other 7.x versions deletes dangerous environment variables with a method that was valid only in older FreeBSD distributions, which might allow remote attackers to execute arbitrary code by passing a crafted environment variable from a telnet client, as demonstrated by an LD_PRELOAD value that references a malicious library.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0642">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ruby-lang:ruby:1.9"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.8</vuln:product>
      <vuln:product>cpe:/a:ruby-lang:ruby:1.9</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0642</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T01:47:48.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11450" name="oval:org.mitre.oval:def:11450"/>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://redmine.ruby-lang.org/issues/show/1091" xml:lang="en">http://redmine.ruby-lang.org/issues/show/1091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:193" xml:lang="en">MDVSA-2009:193</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1140.html" xml:lang="en">RHSA-2009:1140</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33769" xml:lang="en">33769</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022505" xml:lang="en">1022505</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-805-1" xml:lang="en">USN-805-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48761" xml:lang="en">ruby-ocspbasicverify-spoofing(48761)</vuln:reference>
    </vuln:references>
    <vuln:summary>ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0643">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dminnich:simple_php_news:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dminnich:simple_php_news:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0643</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T01:47:48.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0357" xml:lang="en">ADV-2009-0357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48829" xml:lang="en">simplephpnews-news-code-execution(48829)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7999" xml:lang="en">7999</vuln:reference>
    </vuln:references>
    <vuln:summary>Static code injection vulnerability in post.php in Simple PHP News 1.0 final allows remote attackers to inject arbitrary PHP code into news.txt via the post parameter, and then execute the code via a direct request to display.php.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0644">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:swannsecurity:dvr4-securanet:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:swannsecurity:dvr4-securanet:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0644</vuln:cve-id>
    <vuln:published-datetime>2009-02-18T14:30:00.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:57.827-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstorm.linuxsecurity.com/0902-exploits/cctv-disclose.txt" xml:lang="en">http://packetstorm.linuxsecurity.com/0902-exploits/cctv-disclose.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500789/100/0/threaded" xml:lang="en">20090210 Remote Authentication Bypass - Swann DVR4 SecuraNet (possibly DVR9 as well)</vuln:reference>
    </vuln:references>
    <vuln:summary>The HTTP interface in Swann DVR4-SecuraNet has a certain default administrative username and password, which makes it easier for remote attackers to obtain privileged access.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0645">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:jaws:jaws:0.8.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:jaws:jaws:0.8.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0645</vuln:cve-id>
    <vuln:published-datetime>2009-02-18T18:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.jaws-project.com/blog/show/jaws-089-released" xml:lang="en">http://www.jaws-project.com/blog/show/jaws-089-released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33607" xml:lang="en">33607</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48476" xml:lang="en">jaws-index-file-include(48476)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7976" xml:lang="en">7976</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in index.php in Jaws 0.8.8 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) language, (2) Introduction_complete, and (3) use_log parameters, different vectors than CVE-2004-2445.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0646">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:4site:4site_cms:2.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:4site:4site_cms:2.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0646</vuln:cve-id>
    <vuln:published-datetime>2009-02-18T18:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:58.047-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wsec.ru/wsec-09-002-4site-cms-26-multiple-sql-injections/" xml:lang="en">http://wsec.ru/wsec-09-002-4site-cms-26-multiple-sql-injections/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.htbridge.ch/advisory/sql_injection_in_4site_cms.html" xml:lang="en">http://www.htbridge.ch/advisory/sql_injection_in_4site_cms.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/514376/100/0/threaded" xml:lang="en">20101019 SQL Injection in 4site CMS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33594" xml:lang="en">33594</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48483" xml:lang="en">4sitecms-pages-sql-injection(48483)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48486" xml:lang="en">4sitecms-hotels-sql-injection(48486)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48487" xml:lang="en">4sitecms-news-sql-injection(48487)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48488" xml:lang="en">4sitecms-faq-sql-injection(48488)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7964" xml:lang="en">7964</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in 4Site CMS 2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) login and (2) password parameters to pcgi/4site.pl, (3) page parameter to print/print.shtml, (4) s and (5) i parameters to portfolio/index.shtml, (6) h parameter to hotel/index.php, (7) id parameter to news/news1.shtml, and the (8) th parameter to faq/index.shtml.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0647">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:microsoft:windows_live_messenger:2009"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:microsoft:windows_live_messenger:2009</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0647</vuln:cve-id>
    <vuln:published-datetime>2009-02-19T11:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:29:59.717-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501043/100/0/threaded" xml:lang="en">20090218 RE: hello bug in windows live messenger</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33825" xml:lang="en">33825</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0466" xml:lang="en">ADV-2009-0466</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48810" xml:lang="en">wlm-packets-dos(48810)</vuln:reference>
    </vuln:references>
    <vuln:summary>msnmsgr.exe in Windows Live Messenger (WLM) 2009 build 14.0.8064.206, and other 14.0.8064.x builds, allows remote attackers to cause a denial of service (application crash) via a modified header in a packet, as possibly demonstrated by a UTF-8.0 value of the charset field in the Content-Type header line.  NOTE: this has been reported as a format string vulnerability by some sources, but the provenance of that information is unknown.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0648">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:falt4:falt4_extreme:rc4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:falt4:falt4_extreme:rc4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0648</vuln:cve-id>
    <vuln:published-datetime>2009-02-19T11:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.380-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstorm.linuxsecurity.com/0902-exploits/falt4-cms-xsrf.txt" xml:lang="en">http://packetstorm.linuxsecurity.com/0902-exploits/falt4-cms-xsrf.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48786" xml:lang="en">falt4-admin-index-csrf(48786)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site request forgery (CSRF) vulnerabilities in the manage_users handler in admin/index.php in Falt4 CMS (aka Falt4 Extreme) RC4 allow remote attackers to hijack the authentication of administrators for requests that change passwords via the (1) edit and (2) edit_now actions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0649">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:nokia:n95"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:nokia:symbian_s60_browser"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:nokia:symbian_s60_browser</vuln:product>
      <vuln:product>cpe:/h:nokia:n95</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0649</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T13:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:00.123-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500954/100/0/threaded" xml:lang="en">20090213 Nokia N95 browser "setAttributeNode" method crash</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33767" xml:lang="en">33767</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48763" xml:lang="en">nokian95-setattributenode-dos(48763)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8051" xml:lang="en">8051</vuln:reference>
    </vuln:references>
    <vuln:summary>The web browser in Symbian OS on the Nokia N95 cell phone allows remote attackers to cause a denial of service (crash) via JavaScript code that calls the setAttributeNode method.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0650">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tptest:tptest:3.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:tptest:tptest:5.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tptest:tptest:3.1.7</vuln:product>
      <vuln:product>cpe:/a:tptest:tptest:5.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0650</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T13:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:56.827-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33785" xml:lang="en">33785</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48781" xml:lang="en">tptest-pwd-bo(48781)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8058" xml:lang="en">8058</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the GetStatsFromLine function in TPTEST 3.1.7 and earlier, and possibly 5.02, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a STATS line with a long pwd field.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0651">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:5.1mp7"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.0mp7"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:5.1</vuln:product>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:5.1mp7</vuln:product>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.0</vuln:product>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.0mp7</vuln:product>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.5</vuln:product>
      <vuln:product>cpe:/a:symantec:veritas_netbackup_server_%2fenterprise_server:6.5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0651</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T13:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://securityresponse.symantec.com/avcenter/security/Content/2009.02.17.html" xml:lang="en">http://securityresponse.symantec.com/avcenter/security/Content/2009.02.17.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://seer.entsupport.symantec.com/docs/317828.htm" xml:lang="en">http://seer.entsupport.symantec.com/docs/317828.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-253287-1" xml:lang="en">253287</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33772" xml:lang="en">33772</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021734" xml:lang="en">1021734</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0461" xml:lang="en">ADV-2009-0461</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1097" xml:lang="en">ADV-2009-1097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48795" xml:lang="en">veritas-netbackup-vnetd-privilege-escalation(48795)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the Veritas network daemon (aka vnetd) in Symantec Veritas NetBackup Server / Enterprise Server 5.x, 6.0 before MP7 SP1, and 6.5 before 6.5.3.1 allows remote attackers to execute arbitrary code via unknown vectors related to "initial communications setup."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0652">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0652</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:35.520-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396" name="oval:org.mitre.oval:def:11396"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html" xml:lang="en">[dailydave] 20090219 SSL MITM fun.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html" xml:lang="en">[dailydave] 20090220 SSL MITM fun.</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0437.html" xml:lang="en">RHSA-2009:0437</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1797" xml:lang="en">DSA-1797</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:111" xml:lang="en">MDVSA-2009:111</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-15.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-15.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0436.html" xml:lang="en">RHSA-2009:0436</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33837" xml:lang="en">33837</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1125" xml:lang="en">ADV-2009-1125</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48974" xml:lang="en">mozilla-firefox-homoglyph-spoofing(48974)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/764-1/" xml:lang="en">USN-764-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf" xml:lang="en">https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html" xml:lang="en">FEDORA-2009-3875</vuln:reference>
    </vuln:references>
    <vuln:summary>The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0653">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0653</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-25T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-23T12:34:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf" xml:lang="en">https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf</vuln:reference>
    </vuln:references>
    <vuln:summary>OpenSSL, probably 0.9.6, does not verify the Basic Constraints for an intermediate CA-signed certificate, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack, a related issue to CVE-2002-0970.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0654">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.5:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.9:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.10:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.11:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.12:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.13:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.14:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.15:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.16:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.17:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.18:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.19:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.20:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.21:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.22:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.23:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.24:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.25:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.26:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.27:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.28:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.29:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.30:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.31:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.32:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:tor:tor:0.2.0.34:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tor:tor:0.2.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.5:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.9:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.10:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.11:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.12:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.13:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.14:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.15:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.16:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.17:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.18:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.19:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.20:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.21:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.22:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.23:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.24:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.25:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.26:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.27:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.28:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.29:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.30:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.31:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.32:alpha</vuln:product>
      <vuln:product>cpe:/a:tor:tor:0.2.0.34:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0654</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-25T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-23T12:34:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blog.torproject.org/blog/one-cell-enough" xml:lang="en">http://blog.torproject.org/blog/one-cell-enough</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" xml:lang="en">http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf</vuln:reference>
    </vuln:references>
    <vuln:summary>Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router.  NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0655">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:lenovo:veriface:iii"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:lenovo:veriface:iii</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0655</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.660-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://security.bkis.vn/?p=292" xml:lang="en">http://security.bkis.vn/?p=292</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf" xml:lang="en">http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/498997" xml:lang="en">20081208 [SVRT-07-08] Vulnerability in Face Recognition Authentication Mechanism of Lenovo-Asus-Toshiba Laptops</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32700" xml:lang="en">32700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48961" xml:lang="en">lenovo-plainimage-unauth-access(48961)</vuln:reference>
    </vuln:references>
    <vuln:summary>Lenovo Veriface III allows physically proximate attackers to login to a Windows account by presenting a "plain image" of the authorized user.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0656">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:asus:smartlogon:1.0.0005"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:asus:smartlogon:1.0.0005</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0656</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.723-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://security.bkis.vn/?p=292" xml:lang="en">http://security.bkis.vn/?p=292</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf" xml:lang="en">http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/498997" xml:lang="en">20081208 [SVRT-07-08] Vulnerability in Face Recognition Authentication Mechanism of Lenovo-Asus-Toshiba Laptops</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32700" xml:lang="en">32700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48962" xml:lang="en">asus-image-security-bypass(48962)</vuln:reference>
    </vuln:references>
    <vuln:summary>Asus SmartLogon 1.0.0005 allows physically proximate attackers to bypass "security functions" by presenting an image with a modified viewpoint that matches the posture of a stored image of the authorized notebook user.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0657">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:toshiba:face_recognition:2.0.2.32"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:toshiba:face_recognition:2.0.2.32</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0657</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.377-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-255"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://security.bkis.vn/?p=292" xml:lang="en">http://security.bkis.vn/?p=292</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen" xml:lang="en">http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Nguyen</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf" xml:lang="en">http://www.blackhat.com/presentations/bh-dc-09/Nguyen/BlackHat-DC-09-Nguyen-Face-not-your-password.pdf</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/498997" xml:lang="en">20081208 [SVRT-07-08] Vulnerability in Face Recognition Authentication Mechanism of Lenovo-Asus-Toshiba Laptops</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/32700" xml:lang="en">32700</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48963" xml:lang="en">toshibaface-notebook-unauth-access(48963)</vuln:reference>
    </vuln:references>
    <vuln:summary>Toshiba Face Recognition 2.0.2.32 allows physically proximate attackers to obtain notebook access by presenting a large number of images for which the viewpoint and lighting have been modified to match a stored image of the authorized notebook user.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0658">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:7.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.2:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.3:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat:9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:7.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:8.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:adobe:acrobat_reader:9.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:adobe:acrobat:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0:-:pro</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:7.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0:-:pro</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.0.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.2:-:pro</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.3:-:pro</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat:9.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.5</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.6</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.7</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.8</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.0.9</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:7.1.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.0</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.1</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.2</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.3</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:8.1.4</vuln:product>
      <vuln:product>cpe:/a:adobe:acrobat_reader:9.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0658</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-09-27T12:48:23.890-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2019-09-27T11:11:02.357-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5697" name="oval:org.mitre.oval:def:5697"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://isc.sans.org/diary.html?n&amp;storyid=5902" xml:lang="en">http://isc.sans.org/diary.html?n&amp;storyid=5902</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html" xml:lang="en">SUSE-SA:2009:014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-17.xml" xml:lang="en">GLSA-200904-17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1" xml:lang="en">256788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/advisories/apsa09-01.html" xml:lang="en">http://www.adobe.com/support/security/advisories/apsa09-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.adobe.com/support/security/bulletins/apsb09-04.html" xml:lang="en">http://www.adobe.com/support/security/bulletins/apsb09-04.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/905281" xml:lang="en">VU#905281</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0376.html" xml:lang="en">RHSA-2009:0376</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33751" xml:lang="en">33751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021739" xml:lang="en">1021739</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219" xml:lang="en">http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&amp;tabid=2" xml:lang="en">http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&amp;tabid=2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-051A.html" xml:lang="en">TA09-051A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FRSIRT</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0472" xml:lang="en">ADV-2009-0472</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1019" xml:lang="en">ADV-2009-1019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48825" xml:lang="en">adobe-acrobat-reader-image-bo(48825)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8090" xml:lang="en">8090</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8099" xml:lang="en">8099</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in Adobe Reader 9.0 and earlier, and Acrobat 9.0 and earlier, allows remote attackers to execute arbitrary code via a crafted PDF document, related to a non-JavaScript function call and possibly an embedded JBIG2 image stream, as exploited in the wild in February 2009 by Trojan.Pidief.E.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0659">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tptest:tptest:3.1.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tptest:tptest:3.1.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0659</vuln:cve-id>
    <vuln:published-datetime>2009-02-20T14:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.910-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48781" xml:lang="en">tptest-pwd-bo(48781)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48953" xml:lang="en">tptest-getstatsfromline-bo(48953)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the GetStatsFromLine function in TPTEST 3.1.7 allows remote attackers to have an unknown impact via a STATS line with a long email field.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0660">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mahara:mahara:1.0.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0660</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:57.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=350" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=350</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.mahara.org/Release_Notes/1.1.2" xml:lang="en">http://wiki.mahara.org/Release_Notes/1.1.2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1736" xml:lang="en">DSA-1736</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34064" xml:lang="en">34064</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0665" xml:lang="en">ADV-2009-0665</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49168" xml:lang="en">mahara-userprofile-xss(49168)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.0 before 1.0.10 and 1.1 before 1.1.2 allow remote attackers to inject arbitrary web script or HTML via a (1) profile and (2) blog, a different vulnerability than CVE-2009-0487.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0661">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:flashtux:weechat:0.2.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:flashtux:weechat:0.2.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0661</vuln:cve-id>
    <vuln:published-datetime>2009-03-19T06:30:00.390-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:58.020-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=519940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://savannah.nongnu.org/bugs/index.php?25862" xml:lang="en">http://savannah.nongnu.org/bugs/index.php?25862</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://weechat.flashtux.org/" xml:lang="en">http://weechat.flashtux.org/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1744" xml:lang="en">DSA-1744</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/17/8" xml:lang="en">[oss-security] 20090317 Re: CVE request -- firefox, vlc, WeeChat</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34148" xml:lang="en">34148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0758" xml:lang="en">ADV-2009-0758</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49295" xml:lang="en">weechat-ircmessage-dos(49295)</vuln:reference>
    </vuln:references>
    <vuln:summary>Wee Enhanced Environment for Chat (WeeChat) 0.2.6 allows remote attackers to cause a denial of service (crash) via an IRC PRIVMSG command containing crafted color codes that trigger an out-of-bounds read.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0662">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.1"/>
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.2"/>
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.3"/>
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.4"/>
          <cpe-lang:fact-ref name="cpe:/a:plone:plonepas:3.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:plone:plone"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:plone:plonepas:3.0</vuln:product>
      <vuln:product>cpe:/a:plone:plonepas:3.1</vuln:product>
      <vuln:product>cpe:/a:plone:plonepas:3.2</vuln:product>
      <vuln:product>cpe:/a:plone:plonepas:3.3</vuln:product>
      <vuln:product>cpe:/a:plone:plonepas:3.4</vuln:product>
      <vuln:product>cpe:/a:plone:plonepas:3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0662</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:58.083-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://plone.org/products/plone/security/advisories/cve-2009-0662" xml:lang="en">http://plone.org/products/plone/security/advisories/cve-2009-0662</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34664" xml:lang="en">34664</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50061" xml:lang="en">plone-unspecified-session-hijacking(50061)</vuln:reference>
    </vuln:references>
    <vuln:summary>The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product for Plone, does not properly handle the login form, which allows remote authenticated users to acquire the identity of an arbitrary user via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0663">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:perl:perl"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:cmu:dbd%3a%3apg:1.49"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cmu:dbd%3a%3apg:1.49</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0663</vuln:cve-id>
    <vuln:published-datetime>2009-04-30T16:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:57.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499" name="oval:org.mitre.oval:def:9499"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz" xml:lang="en">http://security.debian.org/pool/updates/main/libd/libdbd-pg-perl/libdbd-pg-perl_1.49-2+etch1.diff.gz</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1780" xml:lang="en">DSA-1780</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0479.html" xml:lang="en">RHSA-2009:0479</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1067.html" xml:lang="en">RHSA-2009:1067</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34755" xml:lang="en">34755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50467" xml:lang="en">libdbdpgperl-unspecified-bo(50467)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://launchpad.net/bugs/cve/2009-0663" xml:lang="en">https://launchpad.net/bugs/cve/2009-0663</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0664">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:alpha3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mahara:mahara:1.1.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mahara:mahara:1.0.0</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.0.10</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:alpha3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta3</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:beta4</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mahara:mahara:1.1.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0664</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.670-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-29T01:28:36.063-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mahara.org/interaction/forum/topic.php?id=532" xml:lang="en">http://mahara.org/interaction/forum/topic.php?id=532</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1778" xml:lang="en">DSA-1778</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34677" xml:lang="en">34677</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Mahara 1.0.x before 1.0.11 and 1.1.x before 1.1.3 allow remote attackers to inject arbitrary web script or HTML via (1) the introduction field in a user profile or (2) an arbitrary text block in a user view.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0667">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3-1"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocsinventory-agent:0.0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocsinventory-agent:0.05"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocsinventory-agent:0.08"/>
        <cpe-lang:fact-ref name="cpe:/a:ocsinventory-ng:ocsinventory-agent:0.09"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:beta</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc2</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocs_inventory_ng:1.0:rc3-1</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocsinventory-agent:0.0.9.2</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocsinventory-agent:0.05</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocsinventory-agent:0.08</vuln:product>
      <vuln:product>cpe:/a:ocsinventory-ng:ocsinventory-agent:0.09</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0667</vuln:cve-id>
    <vuln:published-datetime>2009-07-09T13:30:00.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-07-10T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-07-09T15:13:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506416" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506416</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://nana.rulezlan.org/~goneri/ocsinventory-agent/Ocsinventory-Agent-0.0.9.3.tar.gz" xml:lang="en">http://nana.rulezlan.org/~goneri/ocsinventory-agent/Ocsinventory-Agent-0.0.9.3.tar.gz</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://security.debian.org/pool/updates/main/o/ocsinventory-agent/ocsinventory-agent_0.0.9.2repack1-4lenny1.diff.gz" xml:lang="en">http://security.debian.org/pool/updates/main/o/ocsinventory-agent/ocsinventory-agent_0.0.9.2repack1-4lenny1.diff.gz</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1828" xml:lang="en">DSA-1828</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.ocsinventory-ng.org/index.php?mact=News,cntnt01,detail,0&amp;cntnt01articleid=144" xml:lang="en">http://www.ocsinventory-ng.org/index.php?mact=News,cntnt01,detail,0&amp;cntnt01articleid=144</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35593" xml:lang="en">35593</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1809" xml:lang="en">ADV-2009-1809</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in Agent/Backend.pm in Ocsinventory-Agent before 0.0.9.3, and 1.x before 1.0.1, in OCS Inventory allows local users to gain privileges via a Trojan horse Perl module in an arbitrary directory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0668">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:2.8.11"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:2.9.11"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:2.10.9"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:2.11.4"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.8.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zope:zodb:2.8.11</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:2.9.11</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:2.10.9</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:2.11.4</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.1</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.1.1</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.2</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.2.4</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.3</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.3.3</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.4</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.4.1</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.5</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.6</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.7</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.8.0</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.8.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0668</vuln:cve-id>
    <vuln:published-datetime>2009-08-07T15:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:58.193-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html" xml:lang="en">[zope-announce] 20090806 CVE-2009-0668 and CVE-2009-0669: Releases to fix ZODB ZEO server vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2" xml:lang="en">http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35987" xml:lang="en">35987</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2217" xml:lang="en">ADV-2009-2217</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/52377" xml:lang="en">zope-protocol-code-execution(52377)</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0669">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:zope:zodb:3.8.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zope:zodb:3.8</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.8.0</vuln:product>
      <vuln:product>cpe:/a:zope:zodb:3.8.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0669</vuln:cve-id>
    <vuln:published-datetime>2009-08-07T15:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:58.240-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html" xml:lang="en">[zope-announce] 20090806 CVE-2009-0668 and CVE-2009-0669: Releases to fix ZODB ZEO server vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2" xml:lang="en">http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35987" xml:lang="en">35987</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2217" xml:lang="en">ADV-2009-2217</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/52379" xml:lang="en">zope-protocol-auth-bypass(52379)</vuln:reference>
    </vuln:references>
    <vuln:summary>Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0671">
    <vuln:cve-id>CVE-2009-0671</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-26T02:08:04.937-05:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  Format string vulnerability in the University of Washington (UW) c-client library, as used by the UW IMAP toolkit imap-2007d and other applications, allows remote attackers to execute arbitrary code via format string specifiers in the initial request to the IMAP port (143/tcp).  NOTE: Red Hat has disputed the vulnerability, stating "The Red Hat Security Response Team have been unable to confirm the existence of this format string vulnerability in the toolkit, and the sample published exploit is not complete or functional."  CVE agrees that the exploit contains syntax errors and uses Unix-only include files while invoking Windows functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0672">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0672</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:00.547-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html" xml:lang="en">http://ravenphpscripts.com/postt17156.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500988/100/0/threaded" xml:lang="en">20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33787" xml:lang="en">33787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.waraxe.us/advisory-72.html" xml:lang="en">http://www.waraxe.us/advisory-72.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48791" xml:lang="en">ravennuke-modules-sql-injection(48791)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8068" xml:lang="en">8068</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Resend_Email module in Raven Web Services RavenNuke 2.30 allows remote authenticated administrators to execute arbitrary SQL commands via the user_prefix parameter to modules.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0673">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0673</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:01.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html" xml:lang="en">http://ravenphpscripts.com/postt17156.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500988/100/0/threaded" xml:lang="en">20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33787" xml:lang="en">33787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.waraxe.us/advisory-72.html" xml:lang="en">http://www.waraxe.us/advisory-72.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48790" xml:lang="en">ravennuke-admin-code-execution(48790)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8068" xml:lang="en">8068</vuln:reference>
    </vuln:references>
    <vuln:summary>Eval injection vulnerability in the Custom Fields feature in the Your Account module in Raven Web Services RavenNuke 2.30 allows remote authenticated administrators to execute arbitrary PHP code via the ID Field Name box in a yaCustomFields action to admin.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0674">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0674</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:01.873-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html" xml:lang="en">http://ravenphpscripts.com/postt17156.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500988/100/0/threaded" xml:lang="en">20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33787" xml:lang="en">33787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.waraxe.us/advisory-72.html" xml:lang="en">http://www.waraxe.us/advisory-72.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48792" xml:lang="en">ravennuke-captcha-info-disclosure(48792)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48983" xml:lang="en">ravennuke-captcha-afonts-info-disclosure(48983)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8068" xml:lang="en">8068</vuln:reference>
    </vuln:references>
    <vuln:summary>images/captcha.php in Raven Web Services RavenNuke 2.30, when register_globals and display_errors are enabled, allows remote attackers to determine the existence of local files by sending requests with full pathnames in the aFonts array parameter, and then observing the error messages, which differ between existing and nonexistent pathnames.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0675">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0675</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:02.733-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11529" name="oval:org.mitre.oval:def:11529"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8685" name="oval:org.mitre.oval:def:8685"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c25b9abbc2c2c0da88e180c3933d6e773245815a" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c25b9abbc2c2c0da88e180c3933d6e773245815a</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.openwall.net/netdev/2009/01/28/90" xml:lang="en">[netdev] 20090128 [PATCH] drivers/net/skfp: if !capable(CAP_NET_ADMIN): inverted logic</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/02/20/2" xml:lang="en">[oss-security] 20090220 CVE request: kernel: skfp_ioctl inverted logic flaw</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:071" xml:lang="en">MDVSA-2009:071</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0360.html" xml:lang="en">RHSA-2009:0360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=486534" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=486534</vuln:reference>
    </vuln:references>
    <vuln:summary>The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0676">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22_rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24_rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22_rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24_rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0676</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.967-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:08.407-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11653" name="oval:org.mitre.oval:def:11653"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8618" name="oval:org.mitre.oval:def:8618"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=df0bca049d01c0ee94afb7cd5dfd959541e6c8da" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=df0bca049d01c0ee94afb7cd5dfd959541e6c8da</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html" xml:lang="en">SUSE-SA:2009:021</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lkml.org/lkml/2009/2/12/123" xml:lang="en">[linux-kernel] 20090212 [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123540732700371&amp;w=2" xml:lang="en">[linux-kernel] 20090223 net: amend the fix for SO_BSDCOMPAT gsopt infoleak</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/02/20/1" xml:lang="en">[oss-security] 20090220 CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://patchwork.kernel.org/patch/6816/" xml:lang="en">http://patchwork.kernel.org/patch/6816/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0459.html" xml:lang="en">RHSA-2009:0459</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:071" xml:lang="en">MDVSA-2009:071</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/24/1" xml:lang="en">[oss-security] 20090224 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/02/6" xml:lang="en">[oss-security] 20090302 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0360.html" xml:lang="en">RHSA-2009:0360</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33846" xml:lang="en">33846</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=486305" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=486305</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48847" xml:lang="en">kernel-sock-information-disclosure(48847)</vuln:reference>
    </vuln:references>
    <vuln:summary>The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0677">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0677</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:00.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:17.047-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html&amp;sid=12d1201371612260a42fa846ebce7bad" xml:lang="en">http://ravenphpscripts.com/postt17156.html&amp;sid=12d1201371612260a42fa846ebce7bad</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500988/100/0/threaded" xml:lang="en">20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33787" xml:lang="en">33787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.waraxe.us/advisory-72.html" xml:lang="en">http://www.waraxe.us/advisory-72.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48789" xml:lang="en">ravennuke-avatarlist-code-execution(48789)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8068" xml:lang="en">8068</vuln:reference>
    </vuln:references>
    <vuln:summary>avatarlist.php in the Your Account module, reached through modules.php, in Raven Web Services RavenNuke 2.30 allows remote authenticated users to execute arbitrary code via PHP sequences in an element of the replacements array, which is processed by the preg_replace function with the eval switch, as specified in an element of the patterns array.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0678">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0678</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:01.017-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:17.797-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html" xml:lang="en">http://ravenphpscripts.com/postt17156.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500988/100/0/threaded" xml:lang="en">20090216 [waraxe-2009-SA#072] - Multiple Vulnerabilities in RavenNuke 2.3.0</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.waraxe.us/advisory-72.html" xml:lang="en">http://www.waraxe.us/advisory-72.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48792" xml:lang="en">ravennuke-captcha-info-disclosure(48792)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8068" xml:lang="en">8068</vuln:reference>
    </vuln:references>
    <vuln:summary>images/captcha.php in RavenNuke 2.30 allows remote attackers to obtain sensitive information via an aFonts array parameter value that does not correspond to a valid font file, which reveals the installation path in an error message.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0679">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ravenphpscripts:ravennuke:2.30"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ravenphpscripts:ravennuke:2.30</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0679</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:01.030-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:58.757-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://ravenphpscripts.com/postt17156.html" xml:lang="en">http://ravenphpscripts.com/postt17156.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48978" xml:lang="en">ravennuke-youraccount-xss(48978)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the Your Account module in RavenNuke 2.30 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0680">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:netgear:ssl312:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:netgear:ssl312:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0680</vuln:cve-id>
    <vuln:published-datetime>2009-02-22T17:30:01.047-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:57.810-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-02/0084.html" xml:lang="en">20090208 Netgear SSL312 Router - remote DoS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.helith.net/txt/netgear_ssl312_remote_dos.txt" xml:lang="en">http://www.helith.net/txt/netgear_ssl312_remote_dos.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33675" xml:lang="en">33675</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48605" xml:lang="en">netgear-ssl312-dos(48605)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8008" xml:lang="en">8008</vuln:reference>
    </vuln:references>
    <vuln:summary>cgi-bin/welcome/VPN_only in the web interface in Netgear SSL312 allows remote attackers to cause a denial of service (device crash) via a crafted query string, as demonstrated using directory traversal sequences.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0681">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:8.0::home"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:8.0::pro"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.0::home"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.0::professional"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.0.6:-:home"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.0.6:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.9.0:-:home"/>
        <cpe-lang:fact-ref name="cpe:/a:pgp:desktop:9.9.0:-:pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:pgp:desktop:8.0::home</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:8.0::pro</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.0::home</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.0::professional</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.0.6:-:home</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.0.6:-:pro</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.9.0:-:home</vuln:product>
      <vuln:product>cpe:/a:pgp:desktop:9.9.0:-:pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0681</vuln:cve-id>
    <vuln:published-datetime>2009-04-15T06:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:18.313-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://en.securitylab.ru/lab/PT-2009-01" xml:lang="en">http://en.securitylab.ru/lab/PT-2009-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502633/100/0/threaded" xml:lang="en">20090413 [Suspected Spam][Positive Technologies SA 2009-01] PGP Desktop Pgpdisk.sys And Pgpwded.sys Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022034" xml:lang="en">1022034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://pgp.custhelp.com/cgi-bin/pgp.cfg/php/enduser/std_adp.php?p_faqid=1014&amp;p_topview=1" xml:lang="en">https://pgp.custhelp.com/cgi-bin/pgp.cfg/php/enduser/std_adp.php?p_faqid=1014&amp;p_topview=1</vuln:reference>
    </vuln:references>
    <vuln:summary>PGP Desktop before 9.10 allows local users to (1) cause a denial of service (crash) via a crafted IOCTL request to pgpdisk.sys, and (2) cause a denial of service (crash) and execute arbitrary code via a crafted IRP in an IOCTL request to pgpwded.sys.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0682">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite::r3"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite:9.0.0.184:r4:32bit"/>
        <cpe-lang:fact-ref name="cpe:/a:ca:internet_security_suite:10.0.0.217:r5:32bit"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ca:internet_security_suite::r3</vuln:product>
      <vuln:product>cpe:/a:ca:internet_security_suite:9.0.0.184:r4:32bit</vuln:product>
      <vuln:product>cpe:/a:ca:internet_security_suite:10.0.0.217:r5:32bit</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0682</vuln:cve-id>
    <vuln:published-datetime>2009-08-19T13:30:00.890-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:18.670-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://en.securitylab.ru/lab/PT-2009-05" xml:lang="en">http://en.securitylab.ru/lab/PT-2009-05</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/505880/100/0/threaded" xml:lang="en">20090818 CA20090818-02: Security Notice for CA Internet Security Suite</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/506103/100/0/threaded" xml:lang="en">20090826 [PT-2009-05] CA Internet Security Suite Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214673" xml:lang="en">https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=214673</vuln:reference>
    </vuln:references>
    <vuln:summary>vetmonnt.sys in CA Internet Security Suite r3, vetmonnt.sys before 9.0.0.184 in Internet Security Suite r4, and vetmonnt.sys before 10.0.0.217 in Internet Security Suite r5 do not properly verify IOCTL calls, which allows local users to cause a denial of service (system crash) via a crafted call.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0686">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:internet_security:2008"/>
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:internet_security:2008:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:internet_security:2009"/>
        <cpe-lang:fact-ref name="cpe:/a:trendmicro:internet_security:2009:-:pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:trendmicro:internet_security:2008</vuln:product>
      <vuln:product>cpe:/a:trendmicro:internet_security:2008:-:pro</vuln:product>
      <vuln:product>cpe:/a:trendmicro:internet_security:2009</vuln:product>
      <vuln:product>cpe:/a:trendmicro:internet_security:2009:-:pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0686</vuln:cve-id>
    <vuln:published-datetime>2009-04-01T06:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:19.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://en.securitylab.ru/lab/PT-2009-09" xml:lang="en">http://en.securitylab.ru/lab/PT-2009-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip" xml:lang="en">http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502314/100/0/threaded" xml:lang="en">20090331 [Positive Technologies SA 2009-09] Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege Escalation Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34304" xml:lang="en">34304</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021955" xml:lang="en">1021955</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49513" xml:lang="en">trend-tmactmon-privilege-escalation(49513)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8322" xml:lang="en">8322</vuln:reference>
    </vuln:references>
    <vuln:summary>The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0687">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:midnightbsd:midnightbsd:0.3-current"/>
        <cpe-lang:fact-ref name="cpe:/o:mirbsd:miros:10"/>
        <cpe-lang:fact-ref name="cpe:/o:netbsd:netbsd:5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.2"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.4"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:midnightbsd:midnightbsd:0.3-current</vuln:product>
      <vuln:product>cpe:/o:mirbsd:miros:10</vuln:product>
      <vuln:product>cpe:/o:netbsd:netbsd:5.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.2</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.3</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.4</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0687</vuln:cve-id>
    <vuln:published-datetime>2009-08-11T06:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:57.933-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch" xml:lang="en">ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-001.txt.asc" xml:lang="en">NetBSD-SA2009-001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.helith.net/txt/multiple_vendor-PF_null_pointer_dereference.txt" xml:lang="en">http://www.helith.net/txt/multiple_vendor-PF_null_pointer_dereference.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://www.openbsd.org/errata43.html#013_pf" xml:lang="en">[4.3] 013: RELIABILITY FIX: April 11, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://www.openbsd.org/errata44.html#013_pf" xml:lang="en">[4.4] 013: RELIABILITY FIX: April 11, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://www.openbsd.org/errata45.html#002_pf" xml:lang="en">[4.5] 002: RELIABILITY FIX: April 11, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502634" xml:lang="en">20090413 OpenBSD 4.3 up to OpenBSD-current: PF null pointer dereference - remote DoS (kernel panic)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1015" xml:lang="en">ADV-2009-1015</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49837" xml:lang="en">openbsd-packetfilter-dos(49837)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8406" xml:lang="en">8406</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8581" xml:lang="en">8581</vuln:reference>
    </vuln:references>
    <vuln:summary>The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0688">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.27"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.28"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.22"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.4.1</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.0</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.2</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.3</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.5</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.10</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.11</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.13</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.15</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.16</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.20</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.21</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.22</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.23</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.24</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.26</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.27</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:1.5.28</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.0</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.1</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.2</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.3</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.4</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.0.5</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.0</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.1</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.2</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.3</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.5</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.6</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.7</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.8</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.9</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.10</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.11</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.12</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.13</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.14</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.15</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.16</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.17</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.18</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.19</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.20</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.21</vuln:product>
      <vuln:product>cpe:/a:carnegie_mellon_university:cyrus-sasl:2.1.22</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0688</vuln:cve-id>
    <vuln:published-datetime>2009-05-15T11:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.027-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10687" name="oval:org.mitre.oval:def:10687"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6136" name="oval:org.mitre.oval:def:6136"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz" xml:lang="en">ftp://ftp.andrew.cmu.edu/pub/cyrus-mail/cyrus-sasl-2.1.23.tar.gz</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" xml:lang="en">SUSE-SR:2009:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-09.xml" xml:lang="en">GLSA-200907-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.448834" xml:lang="en">SSA:2009-134-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-259148-1" xml:lang="en">259148</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-264248-1" xml:lang="en">264248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-273910-1" xml:lang="en">273910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020755.1-1" xml:lang="en">1020755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021699.1-1" xml:lang="en">1021699</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-184.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1807" xml:lang="en">DSA-1807</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/238019" xml:lang="en">VU#238019</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:113" xml:lang="en">MDVSA-2009:113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html" xml:lang="en">http://www.oracle.com/technetwork/topics/security/cpuapr2010-099504.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1116.html" xml:lang="en">RHSA-2009:1116</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34961" xml:lang="en">34961</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022231" xml:lang="en">1022231</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-790-1" xml:lang="en">USN-790-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA10-103B.html" xml:lang="en">TA10-103B</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1313" xml:lang="en">ADV-2009-1313</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2012" xml:lang="en">ADV-2009-2012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50554" xml:lang="en">solaris-sasl-saslencode64-bo(50554)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0689">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:k-meleon_project:k-meleon:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:release"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:release_p2"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:release_p3"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:release_p4"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:release_p5"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:6.4:stable"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.2"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.2:pre-release"/>
        <cpe-lang:fact-ref name="cpe:/o:freebsd:freebsd:7.2:stable"/>
        <cpe-lang:fact-ref name="cpe:/o:netbsd:netbsd:5.0"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:k-meleon_project:k-meleon:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:release</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:release_p2</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:release_p3</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:release_p4</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:release_p5</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:6.4:stable</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.2</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.2:pre-release</vuln:product>
      <vuln:product>cpe:/o:freebsd:freebsd:7.2:stable</vuln:product>
      <vuln:product>cpe:/o:netbsd:netbsd:5.0</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0689</vuln:cve-id>
    <vuln:published-datetime>2009-07-01T09:00:01.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-11-02T06:29:00.757-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6528" name="oval:org.mitre.oval:def:6528"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9541" name="oval:org.mitre.oval:def:9541"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h" xml:lang="en">http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html" xml:lang="en">APPLE-SA-2010-06-21-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.html" xml:lang="en">SUSE-SR:2009:018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" xml:lang="en">SUSE-SR:2010:013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0311.html" xml:lang="en">RHSA-2014:0311</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2014-0312.html" xml:lang="en">RHSA-2014:0312</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/63" xml:lang="en">20090625 Multiple Vendors libc/gdtoa printf(3) Array Overrun</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/69" xml:lang="en">20091030 Multiple BSD printf(1) and multiple dtoa/*printf(3) vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/71" xml:lang="en">20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/72" xml:lang="en">20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/73" xml:lang="en">20091120 Opera 10.01 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/75" xml:lang="en">20091211 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/76" xml:lang="en">20091211 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/77" xml:lang="en">20091211 Sunbird 0.9 Array Overrun (code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/78" xml:lang="en">20091211 Thunderbird 2.0.0.23 (lib) Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SREASONRES</vuln:source>
      <vuln:reference href="http://securityreason.com/achievement_securityalert/81" xml:lang="en">20100108 MacOS X 10.5/10.6 libc/strtod(3) buffer overflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022478" xml:lang="en">1022478</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1" xml:lang="en">272909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4225" xml:lang="en">http://support.apple.com/kb/HT4225</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:294" xml:lang="en">MDVSA-2009:294</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:330" xml:lang="en">MDVSA-2009:330</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-59.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-59.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c" xml:lang="en">http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.opera.com/support/kb/view/942/" xml:lang="en">http://www.opera.com/support/kb/view/942/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1601.html" xml:lang="en">RHSA-2009:1601</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2010-0153.html" xml:lang="en">RHSA-2010:0153</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2010-0154.html" xml:lang="en">RHSA-2010:0154</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507977/100/0/threaded" xml:lang="en">20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507979/100/0/threaded" xml:lang="en">20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/508417/100/0/threaded" xml:lang="en">20091210 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/508423/100/0/threaded" xml:lang="en">20091210 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35510" xml:lang="en">35510</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-915-1" xml:lang="en">USN-915-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3297" xml:lang="en">ADV-2009-3297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3299" xml:lang="en">ADV-2009-3299</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3334" xml:lang="en">ADV-2009-3334</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0094" xml:lang="en">ADV-2010-0094</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0648" xml:lang="en">ADV-2010-0648</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/0650" xml:lang="en">ADV-2010-0650</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=516396" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=516396</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=516862" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=516862</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.debian.org/debian-lts-announce/2018/11/msg00001.html" xml:lang="en">[debian-lts-announce] 20181101 [SECURITY] [DLA 1564-1] mono security update</vuln:reference>
    </vuln:references>
    <vuln:summary>Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0690">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0"/>
          <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0.2009.1301"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:jpeg2000%2fjbig2_decoder_add-on:2.0.2009.303"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0.2009.1301</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:jpeg2000%2fjbig2_decoder_add-on:2.0.2009.303</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0690</vuln:cve-id>
    <vuln:published-datetime>2009-06-23T17:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-24T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-06-24T08:27:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022425" xml:lang="en">1022425</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security.htm#0602" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security.htm#0602</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/251793" xml:lang="en">VU#251793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35442" xml:lang="en">35442</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1640" xml:lang="en">ADV-2009-1640</vuln:reference>
    </vuln:references>
    <vuln:summary>The Foxit JPEG2000/JBIG2 Decoder add-on before 2.0.2009.616 for Foxit Reader 3.0 before Build 1817 does not properly handle a negative value for the stream offset in a JPEG2000 (aka JPX) stream, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted PDF file that triggers an out-of-bounds read.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0691">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:jpeg2000_jbig2_decoder_add-on:2.0.2009.303"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:foxit_reader:3.0"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxitsoftware:foxit_reader:3.0</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:jpeg2000_jbig2_decoder_add-on:2.0.2009.303</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0691</vuln:cve-id>
    <vuln:published-datetime>2009-06-23T17:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-26T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-06-24T08:40:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022425" xml:lang="en">1022425</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security.htm#0602" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security.htm#0602</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/251793" xml:lang="en">VU#251793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35443" xml:lang="en">35443</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1640" xml:lang="en">ADV-2009-1640</vuln:reference>
    </vuln:references>
    <vuln:summary>The Foxit JPEG2000/JBIG2 Decoder add-on before 2.0.2009.616 for Foxit Reader 3.0 before Build 1817 does not properly handle a fatal error during decoding of a JPEG2000 (aka JPX) header, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted PDF file that triggers an invalid memory access.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0692">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:dhcp:4.1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:dhcp:2.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:3.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:3.1</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.0</vuln:product>
      <vuln:product>cpe:/a:isc:dhcp:4.1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0692</vuln:cve-id>
    <vuln:published-datetime>2009-07-14T16:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.310-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758" name="oval:org.mitre.oval:def:10758"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941" name="oval:org.mitre.oval:def:5941"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc" xml:lang="en">NetBSD-SA2009-010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083" xml:lang="en">SSRT100018</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html" xml:lang="en">SUSE-SA:2009:037</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200907-12.xml" xml:lang="en">GLSA-200907-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.561471" xml:lang="en">SSA:2009-195-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1833" xml:lang="en">DSA-1833</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/410676" xml:lang="en">VU#410676</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:151" xml:lang="en">MDVSA-2009:151</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1136.html" xml:lang="en">RHSA-2009:1136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1154.html" xml:lang="en">RHSA-2009:1154</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35668" xml:lang="en">35668</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022548" xml:lang="en">1022548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-803-1" xml:lang="en">USN-803-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1891" xml:lang="en">ADV-2009-1891</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1796" xml:lang="en">ADV-2010-1796</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=507717" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=507717</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.isc.org/downloadables/12" xml:lang="en">https://www.isc.org/downloadables/12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.isc.org/node/468" xml:lang="en">https://www.isc.org/node/468</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html" xml:lang="en">FEDORA-2009-8344</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html" xml:lang="en">FEDORA-2009-9075</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0693">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.0</vuln:product>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.1</vuln:product>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0693</vuln:cve-id>
    <vuln:published-datetime>2012-06-19T16:55:02.037-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-06-20T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2012-06-20T09:49:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0101.html" xml:lang="en">20090710 'Secure' Wyse thin clients vulnerable to remote exploit bugs</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/654545" xml:lang="en">VU#654545</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/" xml:lang="en">http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf" xml:lang="en">http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in Wyse Device Manager (WDM) 4.7.x allow remote attackers to execute arbitrary code via (1) the User-Agent HTTP header to hserver.dll or (2) unspecified input to hagent.exe.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0695">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:dell:wyse_device_manager:4.7.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.0</vuln:product>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.1</vuln:product>
      <vuln:product>cpe:/a:dell:wyse_device_manager:4.7.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0695</vuln:cve-id>
    <vuln:published-datetime>2012-06-19T16:55:02.630-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-06-26T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2012-06-20T09:47:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0101.html" xml:lang="en">20090710 'Secure' Wyse thin clients vulnerable to remote exploit bugs</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/19137/" xml:lang="en">19137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/654545" xml:lang="en">VU#654545</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/" xml:lang="en">http://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf" xml:lang="en">http://www.wyse.com/serviceandsupport/Wyse%20Security%20Bulletin%20WSB09-01.pdf</vuln:reference>
    </vuln:references>
    <vuln:summary>hagent.exe in Wyse Device Manager (WDM) 4.7.x does not require authentication for commands, which allows remote attackers to obtain management access via a crafted query, as demonstrated by a V52 query that triggers a power-off action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0696">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:a6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:b4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.4.3:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a4"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a5"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a6"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:a7"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:b2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:b3"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:p2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:p2_w1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.5.0:p2_w2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6::~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r2:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r3:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r4:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r4_p1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r5:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r5_b1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r5_p1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r6:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r6_b1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r6_rc1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r6_rc2:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r7:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r7_p1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r7_p2:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r9:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6:r9_p1:~~esv~~~"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:a1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:b1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:p1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:isc:bind:9.6.1:b1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:isc:bind:9.4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:a6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:b4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.0:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.2:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:b3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.4.3:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a4</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a5</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a6</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:a7</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:b2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:b3</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:p2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:p2_w1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.5.0:p2_w2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6::~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r2:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r3:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r4:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r4_p1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r5:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r5_b1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r5_p1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r6:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r6_b1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r6_rc1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r6_rc2:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r7:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r7_p1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r7_p2:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r9:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6:r9_p1:~~esv~~~</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:a1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:b1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:p1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.0:rc2</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.1</vuln:product>
      <vuln:product>cpe:/a:isc:bind:9.6.1:b1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0696</vuln:cve-id>
    <vuln:published-datetime>2009-07-29T13:30:00.920-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:29.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10414" name="oval:org.mitre.oval:def:10414"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12245" name="oval:org.mitre.oval:def:12245"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7806" name="oval:org.mitre.oval:def:7806"/>
    <vuln:cwe id="CWE-16"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-013.txt.asc" xml:lang="en">NetBSD-SA2009-013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt" xml:lang="en">ftp://ftp.sco.com/pub/unixware7/714/security/p535243_uw7/p535243b.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc" xml:lang="en">http://aix.software.ibm.com/aix/efixes/security/bind_advisory.asc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=538975</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-264828-1" xml:lang="en">264828</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020788.1-1" xml:lang="en">1020788</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://up2date.astaro.com/2009/08/up2date_7505_released.html" xml:lang="en">http://up2date.astaro.com/2009/08/up2date_7505_released.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0113" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0113</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/725188" xml:lang="en">VU#725188</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://www.openbsd.org/errata44.html#014_bind" xml:lang="en">[4.4] 014: RELIABILITY FIX: July 29, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/505403/100/0/threaded" xml:lang="en">20090729 rPSA-2009-0113-1 bind bind-utils</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022613" xml:lang="en">1022613</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://www.slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.561499" xml:lang="en">SSA:2009-210-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-808-1" xml:lang="en">USN-808-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2036" xml:lang="en">ADV-2009-2036</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2088" xml:lang="en">ADV-2009-2088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2171" xml:lang="en">ADV-2009-2171</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2247" xml:lang="en">ADV-2009-2247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://www.isc.org/node/474" xml:lang="en">https://www.isc.org/node/474</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01265.html" xml:lang="en">FEDORA-2009-8119</vuln:reference>
    </vuln:references>
    <vuln:summary>The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0698">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:xine:xine-lib:1.1.16.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:xine:xine-lib:1.1.16.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0698</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.110-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:34.780-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.xine-project.org/show_bug.cgi?id=205" xml:lang="en">http://bugs.xine-project.org/show_bug.cgi?id=205</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=660071" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=660071</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:298" xml:lang="en">MDVSA-2009:298</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:299" xml:lang="en">MDVSA-2009:299</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500514/100/0/threaded" xml:lang="en">20090128 [TKADV2009-004] FFmpeg Type Conversion Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.trapkit.de/advisories/TKADV2009-004.txt" xml:lang="en">http://www.trapkit.de/advisories/TKADV2009-004.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-746-1" xml:lang="en">USN-746-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48954" xml:lang="en">xinelib-4xmdemuxer-code-execution(48954)</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0699">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:plunet:business_manager:4.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:plunet:business_manager:4.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0699</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.127-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.177-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0032.html" xml:lang="en">20090107 Plunet BusinessManager failure in access controls and multiple stored cross site scripting</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0054.html" xml:lang="en">20090109 Re: Plunet BusinessManager failure in access controls and multiple stored cross site scripting</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.securenetwork.it/ricerca/advisory/download/SN-2008-04.txt" xml:lang="en">http://www.securenetwork.it/ricerca/advisory/download/SN-2008-04.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33153" xml:lang="en">33153</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47795" xml:lang="en">businessmanager-qub-bez74-xss(47795)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in pagesUTF8/auftrag_allgemeinauftrag.jsp in Plunet BusinessManager 4.1 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the (1) QUB and (2) Bez74 parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0700">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:plunet:business_manager:4.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:plunet:business_manager:4.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0700</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.140-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.240-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0032.html" xml:lang="en">20090107 Plunet BusinessManager failure in access controls and multiple stored cross site scripting</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://archives.neohapsis.com/archives/bugtraq/2009-01/0054.html" xml:lang="en">20090109 Re: Plunet BusinessManager failure in access controls and multiple stored cross site scripting</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.securenetwork.it/ricerca/advisory/download/SN-2008-04.txt" xml:lang="en">http://www.securenetwork.it/ricerca/advisory/download/SN-2008-04.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33153" xml:lang="en">33153</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47794" xml:lang="en">businessmanager-multiple-security-bypass(47794)</vuln:reference>
    </vuln:references>
    <vuln:summary>Plunet BusinessManager 4.1 and earlier allows remote authenticated users to bypass access restrictions and (1) read sensitive Customer or Order data via a modified Pfad parameter to pagesUTF8/Sys_DirAnzeige.jsp, or (2) list sensitive Jobs via a direct request to pagesUTF8/auftrag_job.jsp.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0701">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cybershade:cybershadecms:0.2b"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cybershade:cybershadecms:0.2b</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0701</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.467-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33101" xml:lang="en">33101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47725" xml:lang="en">cybershadecms-index-file-include(47725)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7668" xml:lang="en">7668</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple PHP remote file inclusion vulnerabilities in index.php in Cybershade CMS 0.2b, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the (1) THEME_header and (2) THEME_footer parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0702">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:phoca:com_phocadocumentation:-"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phoca:com_phocadocumentation:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0702</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.187-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.527-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33114" xml:lang="en">33114</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0026" xml:lang="en">ADV-2009-0026</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7670" xml:lang="en">7670</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Phoca Documentation (com_phocadocumentation) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in a section action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0703">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:aspthai.net:aspthai.net_webboard:6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:aspthai.net:aspthai.net_webboard:6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0703</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.590-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33084" xml:lang="en">33084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47722" xml:lang="en">webboard-bview-sql-injection(47722)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7635" xml:lang="en">7635</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in bview.asp in ASPThai.Net Webboard 6.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0704">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:webmastersite:wsn_guest:1.23"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:webmastersite:wsn_guest:1.23</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0704</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33097" xml:lang="en">33097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47723" xml:lang="en">wsnguest-search-sql-injection(47723)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7659" xml:lang="en">7659</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in search.php in WSN Guest 1.23 allows remote attackers to execute arbitrary SQL commands via the search parameter in an advanced action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0705">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:powerscripts:powernews:2.5.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:powerscripts:powernews:2.5.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0705</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.687-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33081" xml:lang="en">33081</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47701" xml:lang="en">powernews-news-sql-injection(47701)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7641" xml:lang="en">7641</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in news.php in PowerScripts PowerNews 2.5.4, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the newsid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0706">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:simple-review:com_simple_review:1.3.5"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
          <cpe-lang:fact-ref name="cpe:/a:mambo:mambo"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:simple-review:com_simple_review:1.3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0706</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.520-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstormsecurity.org/0901-exploits/joomlasimplereview-sql.txt" xml:lang="en">http://packetstormsecurity.org/0901-exploits/joomlasimplereview-sql.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33102" xml:lang="en">33102</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47726" xml:lang="en">simplereview-index-sql-injection(47726)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the Simple Review (com_simple_review) component 1.3.5 for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the category parameter to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0707">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:powerscripts:powerclan:1.14a"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:powerscripts:powerclan:1.14a</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0707</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.280-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.747-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33083" xml:lang="en">33083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47702" xml:lang="en">powerclan-index-sql-injection(47702)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7642" xml:lang="en">7642</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in admin/index.php in PowerClan 1.14a allows remote attackers to execute arbitrary SQL commands via the loginemail parameter (aka login field).  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0708">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.85"/>
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.86"/>
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.87"/>
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.88"/>
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.89"/>
        <cpe-lang:fact-ref name="cpe:/a:semanticscuttle:semanticscuttle:0.90"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.85</vuln:product>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.86</vuln:product>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.87</vuln:product>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.88</vuln:product>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.89</vuln:product>
      <vuln:product>cpe:/a:semanticscuttle:semanticscuttle:0.90</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0708</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-01-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-24T10:31:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-352"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=651587" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=651587</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site request forgery (CSRF) vulnerabilities in SemanticScuttle before 0.91 allow remote attackers to (1) hijack the authentication of administrators via unknown vectors or (2) hijack the authentication of arbitrary users via vectors involving the profile page.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0709">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vlad_alexa_mancini:phpfootball:1.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vlad_alexa_mancini:phpfootball:1.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0709</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47720" xml:lang="en">phpfootball-login-sql-injection(47720)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in PHPFootball 1.6 allows remote attackers to execute arbitrary SQL commands via the user parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0710">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vlad_alexa_mancini:phpfootball:1.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vlad_alexa_mancini:phpfootball:1.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0710</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.343-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.693-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47719" xml:lang="en">phpfootball-filter-xss(47719)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47721" xml:lang="en">phpfootball-login-xss(47721)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in PHPFootball 1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the user parameter to login.php or (2) the dbfield parameter to filter.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0711">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:vlad_alexa_mancini:phpfootball:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:vlad_alexa_mancini:phpfootball:1.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:vlad_alexa_mancini:phpfootball:1.5</vuln:product>
      <vuln:product>cpe:/a:vlad_alexa_mancini:phpfootball:1.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0711</vuln:cve-id>
    <vuln:published-datetime>2009-02-23T10:30:04.360-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.793-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7636" xml:lang="en">7636</vuln:reference>
    </vuln:references>
    <vuln:summary>filter.php in PHPFootball 1.6 and earlier allows remote attackers to retrieve password hashes via a request with an Accounts value for the dbtable parameter, in conjunction with a Password value for the dbfield parameter.  NOTE: this has been reported as a SQL injection vulnerability by some sources, but the provenance of that information is unknown.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0712">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:hp:wmi_mapper"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:hp:insight_manager:2.5"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:wmi_mapper</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0712</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:54:52.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01655638" xml:lang="en">SSRT080040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123688841217193&amp;w=2" xml:lang="en">HPSBMA02413</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34078" xml:lang="en">34078</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021835" xml:lang="en">1021835</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0671" xml:lang="en">ADV-2009-0671</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in WMI Mapper for HP Systems Insight Manager before 2.5.2.0 allows local users to gain privileges via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0713">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:systems_insight_manager:2.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:systems_insight_manager:2.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0713</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:54:52.453-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01655638" xml:lang="en">SSRT080040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=123688841217193&amp;w=2" xml:lang="en">HPSBMA02413</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34078" xml:lang="en">34078</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021836" xml:lang="en">1021836</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0671" xml:lang="en">ADV-2009-0671</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in WMI Mapper for HP Systems Insight Manager before 2.5.2.0 allows remote attackers to obtain sensitive information via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0714">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
          <cpe-lang:fact-ref name="cpe:/o:novell:netware"/>
          <cpe-lang:fact-ref name="cpe:/o:redhat:linux"/>
          <cpe-lang:fact-ref name="cpe:/o:suse:suse_linux:-"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:hp:data_protector_express:3.5:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:data_protector_express:3.5:sp2"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:data_protector_express:3.5:sp2:~~sse~~~"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:data_protector_express:4.0:sp1"/>
          <cpe-lang:fact-ref name="cpe:/a:hp:data_protector_express:4.0:sp1:~~sse~~~"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:data_protector_express:3.5:sp1</vuln:product>
      <vuln:product>cpe:/a:hp:data_protector_express:3.5:sp2</vuln:product>
      <vuln:product>cpe:/a:hp:data_protector_express:3.5:sp2:~~sse~~~</vuln:product>
      <vuln:product>cpe:/a:hp:data_protector_express:4.0:sp1</vuln:product>
      <vuln:product>cpe:/a:hp:data_protector_express:4.0:sp1:~~sse~~~</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0714</vuln:cve-id>
    <vuln:published-datetime>2009-05-14T13:30:00.547-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-10-09T18:58:01.570-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01697543" xml:lang="en">HPSBMA02417</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://ivizsecurity.com/security-advisory-iviz-sr-09002.html" xml:lang="en">http://ivizsecurity.com/security-advisory-iviz-sr-09002.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34955" xml:lang="en">34955</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022220" xml:lang="en">1022220</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1309" xml:lang="en">ADV-2009-1309</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/9006" xml:lang="en">9006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/9007" xml:lang="en">9007</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in the dpwinsup module (dpwinsup.dll) for dpwingad (dpwingad.exe) in HP Data Protector Express and Express SSE 3.x before build 47065, and Express and Express SSE 4.x before build 46537, allows remote attackers to cause a denial of service (application crash) or read portions of memory via one or more crafted packets.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0715">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:storage_essentials:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:storage_essentials:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:storage_essentials:6.0.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:storage_essentials:6.0.2</vuln:product>
      <vuln:product>cpe:/a:hp:storage_essentials:6.0.3</vuln:product>
      <vuln:product>cpe:/a:hp:storage_essentials:6.0.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0715</vuln:cve-id>
    <vuln:published-datetime>2009-04-21T11:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-29T01:28:39.467-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022084" xml:lang="en">1022084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1109" xml:lang="en">ADV-2009-1109</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Secure NaviCLI in HP Storage Essentials 6.0.2 through 6.0.4 allows remote authenticated users to obtain "access" or "extended privileges" via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0716">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5</vuln:product>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0716</vuln:cve-id>
    <vuln:published-datetime>2009-04-21T11:30:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-28T01:38:33.267-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124025929213175&amp;w=2" xml:lang="en">HPSBMA02422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022085" xml:lang="en">1022085</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1108" xml:lang="en">ADV-2009-1108</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP StorageWorks Storage Mirroring 5 before 5.1.1.1090.15 allows remote attackers to cause a denial of service or obtain "access" via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0717">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5</vuln:product>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0717</vuln:cve-id>
    <vuln:published-datetime>2009-04-21T11:30:00.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-28T01:38:33.437-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022086" xml:lang="en">1022086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1108" xml:lang="en">ADV-2009-1108</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP StorageWorks Storage Mirroring 5 before 5.1.1.1090.15 allows remote attackers to cause a denial of service via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0718">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:storageworks_storage_mirroring:5.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5</vuln:product>
      <vuln:product>cpe:/a:hp:storageworks_storage_mirroring:5.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0718</vuln:cve-id>
    <vuln:published-datetime>2009-04-21T11:30:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-28T01:38:33.670-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124025929213175&amp;w=2" xml:lang="en">HPSBMA02422</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022087" xml:lang="en">1022087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1108" xml:lang="en">ADV-2009-1108</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP StorageWorks Storage Mirroring 5 before 5.1.1.1090.15 allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0719">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.23"/>
        <cpe-lang:fact-ref name="cpe:/o:hp:hp-ux:b.11.31"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.11</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.23</vuln:product>
      <vuln:product>cpe:/o:hp:hp-ux:b.11.31</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0719</vuln:cve-id>
    <vuln:published-datetime>2009-04-29T11:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.903-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5791" name="oval:org.mitre.oval:def:5791"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503038" xml:lang="en">HPSBUX02366</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34748" xml:lang="en">34748</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in useradd in HP HP-UX B.11.11, B.11.23, and B.11.31 allows local users to access arbitrary files and directories via unknown vectors, a different issue than CVE-2008-1660.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0720">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.01"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.51"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:openview_network_node_manager:7.53"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.01</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.51</vuln:product>
      <vuln:product>cpe:/a:hp:openview_network_node_manager:7.53</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0720</vuln:cve-id>
    <vuln:published-datetime>2009-05-05T13:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-05-13T01:27:00.890-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124146030732511&amp;w=2" xml:lang="en">SSRT080091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022163" xml:lang="en">1022163</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1250" xml:lang="en">ADV-2009-1250</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0721">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:4.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:hp:remote_graphics_software:5.2.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.0.0</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.0.1</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.0.2</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.0.3</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.1.3</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.1.4</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.2.0</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.2.1</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.2.2</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.2.3</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:4.2.4</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.0</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.1.1</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.1.3</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.1.5</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.2.0</vuln:product>
      <vuln:product>cpe:/a:hp:remote_graphics_software:5.2.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0721</vuln:cve-id>
    <vuln:published-datetime>2009-05-18T14:30:00.843-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-10-09T18:58:02.180-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022221" xml:lang="en">1022221</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01731970" xml:lang="en">SSRT090069</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34980" xml:lang="en">34980</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1323" xml:lang="en">ADV-2009-1323</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Easy Login in the Sender module in HP Remote Graphics Software (RGS) 4.0.0 through 5.2.4 allows remote attackers to execute arbitrary code via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0722">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:potato-scripts:potato_news:1.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:potato-scripts:potato_news:1.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0722</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T13:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:58.950-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33729" xml:lang="en">33729</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8032" xml:lang="en">8032</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in admin.php in Potato News 1.0.0 allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the user cookie parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0723">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:gimp:gimp"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.1:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:sun:openjdk:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.07"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.08"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.09"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.17"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gimp:gimp</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.07</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.08</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.09</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.10</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.11</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.12</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.13</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.14</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.15</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.16</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.1:beta1</vuln:product>
      <vuln:product>cpe:/a:sun:openjdk:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0723</vuln:cve-id>
    <vuln:published-datetime>2009-03-23T10:19:12.500-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:35.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11780" name="oval:org.mitre.oval:def:11780"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-003.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-19.xml" xml:lang="en">GLSA-200904-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.487438" xml:lang="en">SSA:2009-083-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1745" xml:lang="en">DSA-1745</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1769" xml:lang="en">DSA-1769</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:121" xml:lang="en">MDVSA-2009:121</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:137" xml:lang="en">MDVSA-2009:137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:162" xml:lang="en">MDVSA-2009:162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2009-003.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0339.html" xml:lang="en">RHSA-2009:0339</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502018/100/0/threaded" xml:lang="en">20090320 LittleCMS vulnerabilities (OpenJDK, Firefox, GIMP, etc. impacted)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502031/100/0/threaded" xml:lang="en">20090320 [oCERT-2009-003] LittleCMS integer errors</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34185" xml:lang="en">34185</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021869" xml:lang="en">1021869</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-744-1" xml:lang="en">USN-744-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0775" xml:lang="en">ADV-2009-0775</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487508" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487508</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49326" xml:lang="en">littlecms-unspecified-bo(49326)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-0377.html" xml:lang="en">RHSA-2009:0377</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html" xml:lang="en">FEDORA-2009-2903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html" xml:lang="en">FEDORA-2009-2910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html" xml:lang="en">FEDORA-2009-2928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html" xml:lang="en">FEDORA-2009-2970</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html" xml:lang="en">FEDORA-2009-2982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html" xml:lang="en">FEDORA-2009-2983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html" xml:lang="en">FEDORA-2009-3034</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0726">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:gigcalendar:com_gigcalendar:1.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
          <cpe-lang:fact-ref name="cpe:/a:mambo:mambo"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gigcalendar:com_gigcalendar:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0726</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.090-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33241" xml:lang="en">33241</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47919" xml:lang="en">gigcalendar-index-sql-injection(47919)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7746" xml:lang="en">7746</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the GigCalendar (com_gigcal) component 1.0 for Mambo and Joomla! allows remote attackers to execute arbitrary SQL commands via the gigcal_gigs_id parameter in a details action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0727">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tony_iha_kazungu:taifajobs:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tony_iha_kazungu:taifajobs:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0727</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:41.827-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://e-rdc.org/v1/news.php?readmore=126" xml:lang="en">http://e-rdc.org/v1/news.php?readmore=126</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501183/100/0/threaded" xml:lang="en">20090223 [ECHO_ADV_103$2009] taifajobs &lt;= 1.0 (jobid) Remote SQL Injection Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33864" xml:lang="en">33864</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8098" xml:lang="en">8098</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in jobdetails.php in taifajobs 1.0 and earlier allows remote attackers to execute arbitrary SQL commands via the jobid parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0728">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:maxdev:my_egallery:-"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:maxdev:md-pro"/>
          <cpe-lang:fact-ref name="cpe:/a:postnuke:postnuke"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:maxdev:my_egallery:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0728</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.813-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.183-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33871" xml:lang="en">33871</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8100" xml:lang="en">8100</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in the My_eGallery module for MAXdev MDPro (MD-Pro) and Postnuke allows remote attackers to execute arbitrary SQL commands via the pid parameter in a showpic action to index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0729">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:lingx:page_engine_cms:2.0:-:basic"/>
        <cpe-lang:fact-ref name="cpe:/a:lingx:page_engine_cms:2.0:-:pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:lingx:page_engine_cms:2.0:-:basic</vuln:product>
      <vuln:product>cpe:/a:lingx:page_engine_cms:2.0:-:pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0729</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:29:59.897-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33860" xml:lang="en">33860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48856" xml:lang="en">pageengine-fprefix-file-include(48856)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple directory traversal vulnerabilities in Page Engine CMS 2.0 Basic and Pro allow remote attackers to include and execute arbitrary local files via directory traversal sequences in the fPrefix parameter to (1) modules/recent_poll_include.php, (2) modules/login_include.php, and (3) modules/statistics_include.php and (4) configuration.inc.php in includes/.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0730">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:gigcalendar:com_gigcalendar:1.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:joomla:joomla"/>
          <cpe-lang:fact-ref name="cpe:/a:mambo:mambo"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gigcalendar:com_gigcalendar:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0730</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.860-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:42.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501174/100/0/threaded" xml:lang="en">20090221 gigCalendar Joomla Component 1.0 SQL Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501175/100/0/threaded" xml:lang="en">20090221 gigCalendar 1.0 (venuedetails.php) Joomla Component SQL Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501176/100/0/threaded" xml:lang="en">20090221 gigCalendar 1.0 (banddetails.php) Joomla Component SQL Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33859" xml:lang="en">33859</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33863" xml:lang="en">33863</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48865" xml:lang="en">gigcalendar-venuedetails-sql-injection(48865)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in the GigCalendar (com_gigcal) component 1.0 for Mambo and Joomla!, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via (1) the gigcal _venues_id parameter in a details action to index.php, which is not properly handled by venuedetails.php, and (2) the gigcal_bands_id parameter in a details action to index.php, which is not properly handled by banddetails.php, different vectors than CVE-2009-0726.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0731">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:freearcadescript:free_arcade_script:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freearcadescript:free_arcade_script:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0731</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.247-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33869" xml:lang="en">33869</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8094" xml:lang="en">8094</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in pages/play.php in Free Arcade Script 1.0 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the template parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0732">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:lingx:downloadcenter:2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:lingx:downloadcenter:2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0732</vuln:cve-id>
    <vuln:published-datetime>2009-02-24T18:30:03.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:00.007-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48862" xml:lang="en">downloadcenter-common-info-disclosure(48862)</vuln:reference>
    </vuln:references>
    <vuln:summary>Downloadcenter 2.1 stores common.h under the web root with insufficient access control, which allows remote attackers to obtain user credentials and other sensitive information via a direct request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0733">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:gimp:gimp"/>
          <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.1:beta1"/>
          <cpe-lang:fact-ref name="cpe:/a:sun:openjdk:7"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.07"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.08"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.09"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.10"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.11"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.12"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.13"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.14"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.15"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.16"/>
          <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.17"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:gimp:gimp</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.07</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.08</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.09</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.10</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.11</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.12</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.13</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.14</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.15</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.16</vuln:product>
      <vuln:product>cpe:/a:littlecms:lcms:1.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.1:beta1</vuln:product>
      <vuln:product>cpe:/a:sun:openjdk:7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0733</vuln:cve-id>
    <vuln:published-datetime>2009-03-23T10:19:12.517-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:43.157-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9742" name="oval:org.mitre.oval:def:9742"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html" xml:lang="en">SUSE-SR:2009:007</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-003.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-19.xml" xml:lang="en">GLSA-200904-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.487438" xml:lang="en">SSA:2009-083-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1745" xml:lang="en">DSA-1745</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1769" xml:lang="en">DSA-1769</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:121" xml:lang="en">MDVSA-2009:121</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:137" xml:lang="en">MDVSA-2009:137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:162" xml:lang="en">MDVSA-2009:162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.ocert.org/advisories/ocert-2009-003.html" xml:lang="en">http://www.ocert.org/advisories/ocert-2009-003.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0339.html" xml:lang="en">RHSA-2009:0339</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502018/100/0/threaded" xml:lang="en">20090320 LittleCMS vulnerabilities (OpenJDK, Firefox, GIMP, etc. impacted)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502031/100/0/threaded" xml:lang="en">20090320 [oCERT-2009-003] LittleCMS integer errors</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34185" xml:lang="en">34185</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021869" xml:lang="en">1021869</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-744-1" xml:lang="en">USN-744-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0775" xml:lang="en">ADV-2009-0775</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487512" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487512</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49330" xml:lang="en">littlecms-readsetofcurves-bo(49330)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-0377.html" xml:lang="en">RHSA-2009:0377</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html" xml:lang="en">FEDORA-2009-2903</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html" xml:lang="en">FEDORA-2009-2910</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html" xml:lang="en">FEDORA-2009-2928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html" xml:lang="en">FEDORA-2009-2970</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html" xml:lang="en">FEDORA-2009-2982</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html" xml:lang="en">FEDORA-2009-2983</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html" xml:lang="en">FEDORA-2009-3034</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0734">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:nokia:nokia_pc_suite:6.86.9.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:nokia:nokia_pc_suite:6.86.9.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0734</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:49.220-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500627/100/0/threaded" xml:lang="en">20090203 Nokia Multimedia Player v1.1 .m3u Heap Overflow PoC exploit</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0318" xml:lang="en">ADV-2009-0318</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in MultimediaPlayer.exe 6.86.240.7 in Nokia PC Suite 6.86.9.3 allows remote attackers to execute arbitrary code via a long string in a .m3u playlist file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0735">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:papoo:papoo:3.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:papoo:papoo:3.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0735</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33718" xml:lang="en">33718</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8030" xml:lang="en">8030</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in lib/classes/message_class.php in Papoo CMS 3.6, when register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to read and possibly execute arbitrary files via a .. (dot dot) in the pfadhier parameter.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0736">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4.1_01"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.4.2_01"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.5:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.6:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.6:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.6:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.7:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.0:m1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.0:m2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.0:m3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:simon_brown:pebble:2.3.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:simon_brown:pebble:1.0</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4:beta1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4:beta2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4:beta3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4.1_01</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4.2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.4.2_01</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.5</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.5:beta3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.5.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.6</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.6:beta1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.6:beta2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.6:beta3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.6.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.7</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.7:beta1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.7.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.7.2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.8</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:1.9</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.0:m1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.0:m2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.0:m3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.0.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.1:rc1</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.2</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.3</vuln:product>
      <vuln:product>cpe:/a:simon_brown:pebble:2.3.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0736</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-11-08T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-25T16:20:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/forum/forum.php?forum_id=917656" xml:lang="en">http://sourceforge.net/forum/forum.php?forum_id=917656</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=660130" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=660130</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33733" xml:lang="en">33733</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Pebble before 2.3.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0737">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.12.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mediawiki:mediawiki:1.13.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.4</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.5</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.6</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.7</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.8</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.9</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.10</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.6.11</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.12.3</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.1</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.2</vuln:product>
      <vuln:product>cpe:/a:mediawiki:mediawiki:1.13.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0737</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-10-14T01:22:01.267-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.wikimedia.org/pipermail/mediawiki-announce/2009-February/000083.html" xml:lang="en">[MediaWiki-announce] 20090207 MediaWiki releases: security update and new major branch</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES" xml:lang="en">http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_12_4/phase3/RELEASE-NOTES</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES" xml:lang="en">http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_13_4/phase3/RELEASE-NOTES</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES" xml:lang="en">http://svn.wikimedia.org/svnroot/mediawiki/tags/REL1_6_12/phase3/RELEASE-NOTES</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1901" xml:lang="en">DSA-1901</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33681" xml:lang="en">33681</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0368" xml:lang="en">ADV-2009-0368</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the web-based installer (config/index.php) in MediaWiki 1.6 before 1.6.12, 1.12 before 1.12.4, and 1.13 before 1.13.4, when the installer is in active use, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0738">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:frankmancuso:auth_php:1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:frankmancuso:auth_php:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0738</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33723" xml:lang="en">33723</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8033" xml:lang="en">8033</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in Auth Php 1.0 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) passwd parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0739">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:frankmancuso:mynews:0.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:frankmancuso:mynews:0.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0739</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33728" xml:lang="en">33728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8034" xml:lang="en">8034</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in MyNews 0.10 allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) passwd parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0740">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:frankmancuso:bluebird:pre-release"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:frankmancuso:bluebird:pre-release</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0740</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33725" xml:lang="en">33725</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8035" xml:lang="en">8035</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in BlueBird Prelease allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) passwd parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0741">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:craftsilicon:banking%40home:2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:craftsilicon:banking%40home:2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0741</vuln:cve-id>
    <vuln:published-datetime>2009-02-25T15:30:02.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:49.563-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FULLDISC</vuln:source>
      <vuln:reference href="http://lists.grok.org.uk/pipermail/full-disclosure/2009-February/067879.html" xml:lang="en">20090210 Craft Silicon Banking at Home SQL Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500824/100/0/threaded" xml:lang="en">20090210 Craft Silicon Banking@Home SQL Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33721" xml:lang="en">33721</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in Login.asp in Craft Silicon Banking@Home 2.1 and earlier allows remote attackers to execute arbitrary SQL commands via the LoginName parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0742">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:application_control_engine_module"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_6500"/>
          <cpe-lang:fact-ref name="cpe:/h:cisco:catalyst_7600"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/h:cisco:ace_4710"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/h:cisco:ace_4710</vuln:product>
      <vuln:product>cpe:/h:cisco:application_control_engine_module</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0742</vuln:cve-id>
    <vuln:published-datetime>2009-02-26T11:17:20.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-02-27T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-02-27T11:04:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-310"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_advisory09186a0080a7bc82.shtml" xml:lang="en">20090225 Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine</vuln:reference>
    </vuln:references>
    <vuln:summary>The username command in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers and Cisco ACE 4710 Application Control Engine Appliance stores a cleartext password by default, which allows context-dependent attackers to obtain sensitive information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0743">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_meetingplace:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cisco:unified_meetingplace:7.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cisco:unified_meetingplace:6.0</vuln:product>
      <vuln:product>cpe:/a:cisco:unified_meetingplace:7.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0743</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.877-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:00.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CISCO</vuln:source>
      <vuln:reference href="http://www.cisco.com/en/US/products/products_security_response09186a0080a7bc61.html" xml:lang="en">20090226 Cisco Unified MeetingPlace Stored Cross-Site Scripting Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501251/30/0/threaded" xml:lang="en">20090225 Cisco Unified MeetingPlace Web Conferencing Stored Cross Site Scripting Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33915" xml:lang="en">33915</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021778" xml:lang="en">1021778</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48965" xml:lang="en">cisco-meetingplace-emailaddress-xss(48965)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the edit account page in the Web Server in Cisco Unified MeetingPlace Web Conferencing 6.0 before 6.0(517.0) (aka 6.0 MR4) and 7.0 before 7.0(2) (aka 7.0 MR1) allows remote authenticated users to inject arbitrary web script or HTML via the E-mail Address field.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0744">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:safari:4.0:beta"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:safari:4.0:beta</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0744</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.907-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:49.923-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6066" name="oval:org.mitre.oval:def:6066"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501229/100/0/threaded" xml:lang="en">20090225 Apple Safari 4 Beta feeds: URI NULL Pointer Dereference Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33909" xml:lang="en">33909</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48943" xml:lang="en">safari-feedsuri-dos(48943)</vuln:reference>
    </vuln:references>
    <vuln:summary>Apple Safari 4 Beta build 528.16 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a feeds: URI beginning with a (1) % (percent), (2) { (open curly bracket), (3) } (close curly bracket), (4) ^ (caret), (5) ` (backquote), or (6) | (pipe) character, followed by an &amp; (ampersand) character.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0745">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0745</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:50.423-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10942" name="oval:org.mitre.oval:def:10942"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7765" name="oval:org.mitre.oval:def:7765"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.kernel.org/show_bug.cgi?id=12433" xml:lang="en">http://bugzilla.kernel.org/show_bug.cgi?id=12433</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fdff73f094e7220602cc3f8959c7230517976412" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=fdff73f094e7220602cc3f8959c7230517976412</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1243.html" xml:lang="en">RHSA-2009:1243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0509" xml:lang="en">ADV-2009-0509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:summary>The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0746">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0746</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.937-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:52.390-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10342" name="oval:org.mitre.oval:def:10342"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8039" name="oval:org.mitre.oval:def:8039"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.kernel.org/show_bug.cgi?id=12430" xml:lang="en">http://bugzilla.kernel.org/show_bug.cgi?id=12430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e6b8bc09ba2075cd91fbffefcd2778b1a00bd76f" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e6b8bc09ba2075cd91fbffefcd2778b1a00bd76f</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1243.html" xml:lang="en">RHSA-2009:1243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0509" xml:lang="en">ADV-2009-0509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48872" xml:lang="en">linux-kernel-makeindexeddir-ext4-dos(48872)</vuln:reference>
    </vuln:references>
    <vuln:summary>The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0747">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0747</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.953-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:54.470-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8585" name="oval:org.mitre.oval:def:8585"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9200" name="oval:org.mitre.oval:def:9200"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.kernel.org/show_bug.cgi?id=12375" xml:lang="en">http://bugzilla.kernel.org/show_bug.cgi?id=12375</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06a279d636734da32bb62dd2f7b0ade666f65d7c" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=06a279d636734da32bb62dd2f7b0ade666f65d7c</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1243.html" xml:lang="en">RHSA-2009:1243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0509" xml:lang="en">ADV-2009-0509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:summary>The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0748">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0748</vuln:cve-id>
    <vuln:published-datetime>2009-02-27T12:30:09.983-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:56.360-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10683" name="oval:org.mitre.oval:def:10683"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8526" name="oval:org.mitre.oval:def:8526"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.kernel.org/show_bug.cgi?id=12371" xml:lang="en">http://bugzilla.kernel.org/show_bug.cgi?id=12371</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ec110281379826c5cf6ed14735e47027c3c5765" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=4ec110281379826c5cf6ed14735e47027c3c5765</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-1243.html" xml:lang="en">RHSA-2009:1243</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1749" xml:lang="en">DSA-1749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0509" xml:lang="en">ADV-2009-0509</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:summary>The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0749">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.6"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.7"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.4.8"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:cosmin_truta:optipng:0.6.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.0</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.1</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.2</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.3</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.3.1</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.3.2</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.1</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.2</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.3</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.4</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.5</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.6</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.7</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.4.8</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5.1</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5.2</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5.3</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5.4</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.5.5</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.6</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.6.1</vuln:product>
      <vuln:product>cpe:/a:cosmin_truta:optipng:0.6.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0749</vuln:cve-id>
    <vuln:published-datetime>2009-03-02T15:30:00.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:00.350-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" xml:lang="en">SUSE-SR:2009:006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://optipng.sourceforge.net" xml:lang="en">http://optipng.sourceforge.net</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2582013&amp;group_id=151404&amp;atid=780913" xml:lang="en">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2582013&amp;group_id=151404&amp;atid=780913</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-12.xml" xml:lang="en">GLSA-200903-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/24/2" xml:lang="en">[oss-security] 20090224 CVE request: optipng security release</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/25/4" xml:lang="en">[oss-security] 20090225 Re: CVE request: optipng security release</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33873" xml:lang="en">33873</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0510" xml:lang="en">ADV-2009-0510</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48879" xml:lang="en">optipng-gifreadnextextension-code-execution(48879)</vuln:reference>
    </vuln:references>
    <vuln:summary>Use-after-free vulnerability in the GIFReadNextExtension function in lib/pngxtern/gif/gifread.c in OptiPNG 0.6.2 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted GIF image that causes the realloc function to return a new pointer, which triggers memory corruption when the old pointer is accessed.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0750">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:txtsql:txtsql:2.2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:tombstone:smnews:-"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tombstone:smnews:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0750</vuln:cve-id>
    <vuln:published-datetime>2009-03-02T17:30:00.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:33:59.997-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48813" xml:lang="en">smnews-login-sql-injection(48813)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8076" xml:lang="en">8076</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in the smNews example script for txtSQL 2.2 Final allows remote attackers to execute arbitrary SQL commands via the username parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0751">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.50"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.51"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.52"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.53"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.54"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.55"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.56"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.57"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.58"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.61"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.62"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.63"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.64"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.65"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.66"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.67"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.68"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.70"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.71"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.72"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.73"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.74"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.75"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.76"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.77"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.78"/>
        <cpe-lang:fact-ref name="cpe:/a:yaws:yaws:1.79"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:yaws:yaws:1.50</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.51</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.52</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.53</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.54</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.55</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.56</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.57</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.58</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.61</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.62</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.63</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.64</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.65</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.66</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.67</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.68</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.70</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.71</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.72</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.73</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.74</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.75</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.76</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.77</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.78</vuln:product>
      <vuln:product>cpe:/a:yaws:yaws:1.79</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0751</vuln:cve-id>
    <vuln:published-datetime>2009-03-02T17:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.060-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1740" xml:lang="en">DSA-1740</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/19/1" xml:lang="en">[oss-security] 20090219 CVE request for yaws</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33834" xml:lang="en">33834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0590" xml:lang="en">ADV-2009-0590</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://yaws.hyber.org/" xml:lang="en">http://yaws.hyber.org/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8148" xml:lang="en">8148</vuln:reference>
    </vuln:references>
    <vuln:summary>Yaws before 1.80 allows remote attackers to cause a denial of service (memory consumption and crash) via a request with a large number of headers.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0752">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.0:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.0:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.01:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.01:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.01:b:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.01:b:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.2:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.2:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.12:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.12:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.21:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.21:-:pro"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.23:-:community_solution"/>
        <cpe-lang:fact-ref name="cpe:/a:sixapart:movable_type:4.23:-:pro"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sixapart:movable_type:4.0:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.0:-:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.01:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.01:-:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.01:b:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.01:b:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.2:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.2:-:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.12:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.12:-:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.21:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.21:-:pro</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.23:-:community_solution</vuln:product>
      <vuln:product>cpe:/a:sixapart:movable_type:4.23:-:pro</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0752</vuln:cve-id>
    <vuln:published-datetime>2009-03-02T19:30:00.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-04T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-03T12:11:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html" xml:lang="en">http://www.movabletype.com/blog/2009/02/movable-type-424-get-updated-with-better-password-recovery.html</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in Movable Type Pro and Community Solution 4.x before 4.24 has unknown impact and attack vectors, possibly related to the password recovery mechanism.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0753">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mldonkey:mldonkey:2.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mldonkey:mldonkey:2.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mldonkey:mldonkey:2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mldonkey:mldonkey:2.9.0-r3"/>
        <cpe-lang:fact-ref name="cpe:/a:mldonkey:mldonkey:2.9.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mldonkey:mldonkey:2.8.4</vuln:product>
      <vuln:product>cpe:/a:mldonkey:mldonkey:2.8.7</vuln:product>
      <vuln:product>cpe:/a:mldonkey:mldonkey:2.9</vuln:product>
      <vuln:product>cpe:/a:mldonkey:mldonkey:2.9.0-r3</vuln:product>
      <vuln:product>cpe:/a:mldonkey:mldonkey:2.9.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0753</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.137-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://savannah.nongnu.org/bugs/?25667" xml:lang="en">http://savannah.nongnu.org/bugs/?25667</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1739" xml:lang="en">DSA-1739</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200903-36.xml" xml:lang="en">GLSA-200903-36</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/23/1" xml:lang="en">[oss-security] 20090223 CVE request: mldonkey arbitrary file download vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33865" xml:lang="en">33865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8097" xml:lang="en">8097</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00542.html" xml:lang="en">FEDORA-2009-2703</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00617.html" xml:lang="en">FEDORA-2009-2758</vuln:reference>
    </vuln:references>
    <vuln:summary>Absolute path traversal vulnerability in MLDonkey 2.8.4 through 2.9.7 allows remote attackers to read arbitrary files via a leading "//" (double slash) in the filename.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0754">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:php:php:4.4.4"/>
          <cpe-lang:fact-ref name="cpe:/a:php:php:5.1.6"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apache:apache"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php:php:4.4.4</vuln:product>
      <vuln:product>cpe:/a:php:php:5.1.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0754</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.233-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:38.723-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.1</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11035" name="oval:org.mitre.oval:def:11035"/>
    <vuln:cwe id="CWE-134"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.php.net/bug.php?id=27421" xml:lang="en">http://bugs.php.net/bug.php?id=27421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html" xml:lang="en">SUSE-SR:2009:008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1789" xml:lang="en">DSA-1789</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/01/30/1" xml:lang="en">[oss-security] 20090130 CVE Request - php (PHP BZ#27421)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/03/3" xml:lang="en">[oss-security] 20090203 Re: CVE Request - php (PHP BZ#27421)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/25/3" xml:lang="en">[oss-security] 20090225 Re: CVE Request - php (PHP BZ#27421)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0350.html" xml:lang="en">RHSA-2009:0350</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021979" xml:lang="en">1021979</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/761-1/" xml:lang="en">USN-761-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html" xml:lang="en">FEDORA-2009-3768</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html" xml:lang="en">FEDORA-2009-3848</vuln:reference>
    </vuln:references>
    <vuln:summary>PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0755">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.90"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.91"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:poppler:poppler:0.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.2.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.9</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.90</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.91</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0755</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:58.377-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.freedesktop.org/show_bug.cgi?id=19790" xml:lang="en">http://bugs.freedesktop.org/show_bug.cgi?id=19790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.freedesktop.org/archives/poppler/2009-January/004406.html" xml:lang="en">[poppler] 20090128 poppler/Form.cc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0059" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1941" xml:lang="en">DSA-1941</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/13/1" xml:lang="en">[oss-security] 20090213 CVE Request: Poppler -Two Denial of Service Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/19/2" xml:lang="en">[oss-security] 20090219 Re: CVE Request: Poppler -Two Denial of Service Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502761/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0059-1 poppler</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33749" xml:lang="en">33749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-850-1" xml:lang="en">USN-850-1</vuln:reference>
    </vuln:references>
    <vuln:summary>The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file with an invalid Form Opt entry.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0756">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.90"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.91"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:poppler:poppler:0.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.2.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.9</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.90</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.91</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0756</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.267-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:30:59.720-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.freedesktop.org/show_bug.cgi?id=19702" xml:lang="en">http://bugs.freedesktop.org/show_bug.cgi?id=19702</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.freedesktop.org/archives/poppler/2009-January/004403.html" xml:lang="en">[poppler] 20090123 poppler/JBIG2Stream.cc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0059" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/13/1" xml:lang="en">[oss-security] 20090213 CVE Request: Poppler -Two Denial of Service Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/19/2" xml:lang="en">[oss-security] 20090219 Re: CVE Request: Poppler -Two Denial of Service Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502761/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0059-1 poppler</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33749" xml:lang="en">33749</vuln:reference>
    </vuln:references>
    <vuln:summary>The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0757">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mpfr:gnu_mpfr:2.4.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mpfr:gnu_mpfr:2.4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0757</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.297-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-05-13T01:27:05.420-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://mpfr.loria.fr/mpfr-2.4.1/" xml:lang="en">http://mpfr.loria.fr/mpfr-2.4.1/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/02/4" xml:lang="en">[oss-security] 20090302 CVE Request: mpfr (Buffer Overflow)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33945" xml:lang="en">33945</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-772-1" xml:lang="en">USN-772-1</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple buffer overflows in GNU MPFR 2.4.0 allow context-dependent attackers to cause a denial of service (crash) via the (1) mpfr_snprintf and (2) mpfr_vsnprintf functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0758">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:avahi:avahi-daemon:0.6.23"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:avahi:avahi-daemon:0.6.23</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0758</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.313-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-08-12T10:13:50.063-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683" xml:lang="en">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html" xml:lang="en">SUSE-SR:2010:002</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2010/dsa-2086" xml:lang="en">DSA-2086</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:076" xml:lang="en">MDVSA-2009:076</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/02/1" xml:lang="en">[oss-security] 20090302 CVE id request: avahi</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33946" xml:lang="en">33946</vuln:reference>
    </vuln:references>
    <vuln:summary>The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0759">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:znc:znc:0.056"/>
        <cpe-lang:fact-ref name="cpe:/a:znc:znc:0.058"/>
        <cpe-lang:fact-ref name="cpe:/a:znc:znc:0.062"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:znc:znc:0.056</vuln:product>
      <vuln:product>cpe:/a:znc:znc:0.058</vuln:product>
      <vuln:product>cpe:/a:znc:znc:0.062</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0759</vuln:cve-id>
    <vuln:published-datetime>2009-03-03T11:30:05.327-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-09T01:32:57.140-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1735" xml:lang="en">DSA-1735</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/01/2" xml:lang="en">[oss-security] 20090301 CVE id request: znc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://znc.svn.sourceforge.net/viewvc/znc/trunk/modules/webadmin.cpp?view=log&amp;sortby=rev&amp;sortdir=down&amp;pathrev=1395" xml:lang="en">http://znc.svn.sourceforge.net/viewvc/znc/trunk/modules/webadmin.cpp?view=log&amp;sortby=rev&amp;sortdir=down&amp;pathrev=1395</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://znc.svn.sourceforge.net/viewvc/znc?view=rev&amp;sortby=rev&amp;sortdir=down&amp;revision=1395" xml:lang="en">http://znc.svn.sourceforge.net/viewvc/znc?view=rev&amp;sortby=rev&amp;sortdir=down&amp;revision=1395</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://znc.svn.sourceforge.net/viewvc/znc?view=rev&amp;sortby=rev&amp;sortdir=down&amp;revision=1396" xml:lang="en">http://znc.svn.sourceforge.net/viewvc/znc?view=rev&amp;sortby=rev&amp;sortdir=down&amp;revision=1396</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple CRLF injection vulnerabilities in webadmin in ZNC before 0.066 allow remote authenticated users to modify the znc.conf configuration file and gain privileges via CRLF sequences in the quit message and other vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0760">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:team5:team_board:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:team5:team_board:2.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:team5:team_board:1.0.0</vuln:product>
      <vuln:product>cpe:/a:team5:team_board:2.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0760</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://packetstorm.linuxsecurity.com/0902-exploits/teamboard-ddxss.txt" xml:lang="en">http://packetstorm.linuxsecurity.com/0902-exploits/teamboard-ddxss.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7982" xml:lang="en">7982</vuln:reference>
    </vuln:references>
    <vuln:summary>Team Board 1.x and 2.x stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database containing credentials via a direct request for data/team.mdb.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0761">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:team5.team_board:1.0.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:team5.team_board:1.0</vuln:product>
      <vuln:product>cpe:/a:team5.team_board:1.0.1</vuln:product>
      <vuln:product>cpe:/a:team5.team_board:1.0.2</vuln:product>
      <vuln:product>cpe:/a:team5.team_board:1.0.3</vuln:product>
      <vuln:product>cpe:/a:team5.team_board:1.0.4</vuln:product>
      <vuln:product>cpe:/a:team5.team_board:1.0.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0761</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33614" xml:lang="en">33614</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7982" xml:lang="en">7982</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in online.asp in Team Board 1.x allows remote attackers to inject arbitrary web script or HTML via the lookname parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0762">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:scriptsez:ez_php_comment:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:scriptsez:ez_php_comment:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0762</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-06T01:50:20.563-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-06T09:11:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33587" xml:lang="en">33587</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in ScriptsEz Ez PHP Comment allows remote attackers to inject arbitrary web script or HTML via the name parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0763">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bookelves:kipper:2.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bookelves:kipper:2.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0763</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.387-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33640" xml:lang="en">33640</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7993" xml:lang="en">7993</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in default.php in Kipper 2.01 allows remote attackers to inject arbitrary web script or HTML via the charm parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0764">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bookelves:kipper:2.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bookelves:kipper:2.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0764</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-17T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-06T09:26:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in Kipper 2.01 allow remote attackers to inject arbitrary web script or HTML via the charm parameter to (1) index.php and (2) kipper.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0765">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bookelves:kipper:2.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bookelves:kipper:2.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0765</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33640" xml:lang="en">33640</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49271" xml:lang="en">kipper-index-file-include(49271)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7993" xml:lang="en">7993</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in index.php in Kipper 2.01 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the configfile parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0766">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bookelves:kipper:2.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bookelves:kipper:2.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0766</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.733-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-06T01:50:20.733-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-06T09:32:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:summary>Directory traversal vulnerability in default.php in Kipper 2.01 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the configfile parameter.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0767">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bookelves:kipper:2.01"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bookelves:kipper:2.01</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0767</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.797-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.497-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7993" xml:lang="en">7993</vuln:reference>
    </vuln:references>
    <vuln:summary>Kipper 2.01 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a file containing credentials via a direct request for job/config.data.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0768">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:yapbb:yapbb:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:yapbb:yapbb:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:yapbb:yapbb:1.2:beta2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:yapbb:yapbb:1.1</vuln:product>
      <vuln:product>cpe:/a:yapbb:yapbb:1.2</vuln:product>
      <vuln:product>cpe:/a:yapbb:yapbb:1.2:beta2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0768</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.827-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.577-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33620" xml:lang="en">33620</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7984" xml:lang="en">7984</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in forumhop.php in YapBB 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the forumID parameter in a next action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0769">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:qip:qip:2005"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:qip:qip:2005</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0769</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.890-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:00.673-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/500656/100/0/threaded" xml:lang="en">20090204 QIP 2005 Denial of Service Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33609" xml:lang="en">33609</vuln:reference>
    </vuln:references>
    <vuln:summary>QIP 2005 build 8082 allows remote attackers to cause a denial of service (CPU consumption and application hang) via a crafted Rich Text Format (RTF) ICQ message, as demonstrated by an {\rtf\pict\&amp;&amp;} message.  NOTE: the vulnerability may be in Sergey Tkachenko TRichView. If so, then this should not be treated as a vulnerability in QIP.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0770">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dkim:dkim-milter:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:dkim:dkim-milter:2.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:dkim:dkim-milter:2.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:dkim:dkim-milter:2.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:dkim:dkim-milter:2.8.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dkim:dkim-milter:2.6.0</vuln:product>
      <vuln:product>cpe:/a:dkim:dkim-milter:2.7.0</vuln:product>
      <vuln:product>cpe:/a:dkim:dkim-milter:2.7.1</vuln:product>
      <vuln:product>cpe:/a:dkim:dkim-milter:2.7.2</vuln:product>
      <vuln:product>cpe:/a:dkim:dkim-milter:2.8.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0770</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T01:50:20.920-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:00.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=654247" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=654247</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2508602&amp;group_id=139420&amp;atid=744358" xml:lang="en">http://sourceforge.net/tracker/index.php?func=detail&amp;aid=2508602&amp;group_id=139420&amp;atid=744358</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1728" xml:lang="en">DSA-1728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/03/01/1" xml:lang="en">[oss-security] 20090302 CVE id request: dkim-milter</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33337" xml:lang="en">33337</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48085" xml:lang="en">dkimmilter-p-dos(48085)</vuln:reference>
    </vuln:references>
    <vuln:summary>dkim-milter 2.6.0 through 2.8.0 allows remote attackers to cause a denial of service (crash) by signing a message with a key that has been revoked in DNS, which triggers an assertion error.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0771">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0771</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.390-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.683-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11314" name="oval:org.mitre.oval:def:11314"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5250" name="oval:org.mitre.oval:def:5250"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6163" name="oval:org.mitre.oval:def:6163"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6196" name="oval:org.mitre.oval:def:6196"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6755" name="oval:org.mitre.oval:def:6755"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-07.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021795" xml:lang="en">1021795</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/buglist.cgi?bug_id=424276,435209,436965,460706,466057,468578,471594,472502" xml:lang="en">https://bugzilla.mozilla.org/buglist.cgi?bug_id=424276,435209,436965,460706,466057,468578,471594,472502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0772">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0772</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.407-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:40.567-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5703" name="oval:org.mitre.oval:def:5703"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5945" name="oval:org.mitre.oval:def:5945"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6097" name="oval:org.mitre.oval:def:6097"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6811" name="oval:org.mitre.oval:def:6811"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9609" name="oval:org.mitre.oval:def:9609"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-07.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0325.html" xml:lang="en">RHSA-2009:0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021795" xml:lang="en">1021795</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=475136" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=475136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/741-1/" xml:lang="en">USN-741-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0773">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0773</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:00.933-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10491" name="oval:org.mitre.oval:def:10491"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5856" name="oval:org.mitre.oval:def:5856"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5980" name="oval:org.mitre.oval:def:5980"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6141" name="oval:org.mitre.oval:def:6141"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6708" name="oval:org.mitre.oval:def:6708"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-07.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021795" xml:lang="en">1021795</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=457521" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=457521</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=467499" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=467499</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=472787" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=472787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0774">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0774</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:47.163-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11138" name="oval:org.mitre.oval:def:11138"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5947" name="oval:org.mitre.oval:def:5947"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6057" name="oval:org.mitre.oval:def:6057"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6121" name="oval:org.mitre.oval:def:6121"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6945" name="oval:org.mitre.oval:def:6945"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-07.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-07.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0325.html" xml:lang="en">RHSA-2009:0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021795" xml:lang="en">1021795</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=473709" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=473709</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/741-1/" xml:lang="en">USN-741-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0775">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0775</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.467-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:01.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5806" name="oval:org.mitre.oval:def:5806"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5816" name="oval:org.mitre.oval:def:5816"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6207" name="oval:org.mitre.oval:def:6207"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7584" name="oval:org.mitre.oval:def:7584"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9681" name="oval:org.mitre.oval:def:9681"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-08.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-08.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0325.html" xml:lang="en">RHSA-2009:0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021796" xml:lang="en">1021796</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=474456" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=474456</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:summary>Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0776">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0776</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.483-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-03T17:58:53.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5956" name="oval:org.mitre.oval:def:5956"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6017" name="oval:org.mitre.oval:def:6017"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6191" name="oval:org.mitre.oval:def:6191"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7390" name="oval:org.mitre.oval:def:7390"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9241" name="oval:org.mitre.oval:def:9241"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" xml:lang="en">SUSE-SA:2009:023</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.405420" xml:lang="en">SSA:2009-083-02</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.433952" xml:lang="en">SSA:2009-083-03</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1751" xml:lang="en">DSA-1751</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1830" xml:lang="en">DSA-1830</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" xml:lang="en">MDVSA-2009:083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-09.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-09.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0258.html" xml:lang="en">RHSA-2009:0258</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0325.html" xml:lang="en">RHSA-2009:0325</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021797" xml:lang="en">1021797</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=414540" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=414540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/741-1/" xml:lang="en">USN-741-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" xml:lang="en">FEDORA-2009-2882</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" xml:lang="en">FEDORA-2009-2884</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01077.html" xml:lang="en">FEDORA-2009-3101</vuln:reference>
    </vuln:references>
    <vuln:summary>nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0777">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:3.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:seamonkey:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:thunderbird:2.0.0.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:3.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:alpha</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:seamonkey:1.1.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:thunderbird:2.0.0.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0777</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.500-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:01.433-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11222" name="oval:org.mitre.oval:def:11222"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6039" name="oval:org.mitre.oval:def:6039"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6157" name="oval:org.mitre.oval:def:6157"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6229" name="oval:org.mitre.oval:def:6229"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7435" name="oval:org.mitre.oval:def:7435"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" xml:lang="en">SUSE-SA:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/alerts/2009/Mar/1021799.html" xml:lang="en">1021799</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document" xml:lang="en">http://support.avaya.com/japple/css/japple?temp.documentID=366362&amp;temp.productID=154235&amp;temp.releaseID=361845&amp;temp.bucketID=126655&amp;PAGE=Document</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" xml:lang="en">MDVSA-2009:075</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.mozilla.org/security/announce/2009/mfsa2009-11.html" xml:lang="en">http://www.mozilla.org/security/announce/2009/mfsa2009-11.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0315.html" xml:lang="en">RHSA-2009:0315</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33990" xml:lang="en">33990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0632" xml:lang="en">ADV-2009-0632</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.mozilla.org/show_bug.cgi?id=452979" xml:lang="en">https://bugzilla.mozilla.org/show_bug.cgi?id=452979</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49087" xml:lang="en">mozilla-invisible-url-spoofing(49087)</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0778">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0:test9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:git7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0:test9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:git7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0778</vuln:cve-id>
    <vuln:published-datetime>2009-03-12T11:20:49.780-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:01.047-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.1</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10215" name="oval:org.mitre.oval:def:10215"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7867" name="oval:org.mitre.oval:def:7867"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/03/11/2" xml:lang="en">[oss-security] 20090311 CVE-2009-0778 kernel: rt_cache leak</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0326.html" xml:lang="en">RHSA-2009:0326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34084" xml:lang="en">34084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021958" xml:lang="en">1021958</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=485163" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=485163</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49199" xml:lang="en">linux-kernel-rtcache-dos(49199)</vuln:reference>
    </vuln:references>
    <vuln:summary>The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an "rt_cache leak."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0779">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:5.3"/>
        <cpe-lang:fact-ref name="cpe:/o:ibm:aix:6.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:ibm:aix:5.3</vuln:product>
      <vuln:product>cpe:/o:ibm:aix:6.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0779</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T06:30:00.420-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-04T06:30:00.420-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.2</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-04T11:14:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021741" xml:lang="en">1021741</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33852" xml:lang="en">33852</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0487" xml:lang="en">ADV-2009-0487</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ44199" xml:lang="en">IZ44199</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ44220" xml:lang="en">IZ44220</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ44332" xml:lang="en">IZ44332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=isg1IZ44388" xml:lang="en">IZ44388</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in pppdial in IBM AIX 5.3 and 6.1 allows local users to gain privileges via a long "input string."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0780">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.3"/>
        <cpe-lang:fact-ref name="cpe:/o:openbsd:openbsd:4.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:openbsd:openbsd:4.3</vuln:product>
      <vuln:product>cpe:/o:openbsd:openbsd:4.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0780</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T06:30:00.453-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:00.803-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://openbsd.org/errata43.html#010_bgpd" xml:lang="en">[4.3] 010: RELIABILITY FIX: February 18, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>OPENBSD</vuln:source>
      <vuln:reference href="http://openbsd.org/errata44.html#010_bgpd" xml:lang="en">[4.4] 010: RELIABILITY FIX: February 18, 2009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33828" xml:lang="en">33828</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021736" xml:lang="en">1021736</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48812" xml:lang="en">openbsd-aspathprepend-dos(48812)</vuln:reference>
    </vuln:references>
    <vuln:summary>The aspath_prepend function in rde_attr.c in bgpd in OpenBSD 4.3 and 4.4 allows remote attackers to cause a denial of service (application crash) via an Autonomous System (AS) advertisement containing a long AS path.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0781">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.30"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.31"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.32"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.33"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.34"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.35"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.37"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.16"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:tomcat:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.30</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.31</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.32</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.33</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.34</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.35</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.36</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.37</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.16</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0781</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-25T07:30:46.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11041" name="oval:org.mitre.oval:def:11041"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19345" name="oval:org.mitre.oval:def:19345"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6564" name="oval:org.mitre.oval:def:6564"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127420533226623&amp;w=2" xml:lang="en">HPSBMA02535</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129070310906557&amp;w=2" xml:lang="en">HPSBUX02579</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=133469267822771&amp;w=2" xml:lang="en">HPSBOV02762</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136485229118404&amp;w=2" xml:lang="en">HPSBUX02860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1" xml:lang="en">263529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-4.html" xml:lang="en">http://tomcat.apache.org/security-4.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-5.html" xml:lang="en">http://tomcat.apache.org/security-5.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-6.html" xml:lang="en">http://tomcat.apache.org/security-6.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2207" xml:lang="en">DSA-2207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:136" xml:lang="en">MDVSA-2009:136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:138" xml:lang="en">MDVSA-2009:138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501538/100/0/threaded" xml:lang="en">20090306 [SECURITY] CVE-2009-0781 XSS in Apache Tomcat examples web application</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1856" xml:lang="en">ADV-2009-1856</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/3056" xml:lang="en">ADV-2010-3056</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49213" xml:lang="en">tomcat-cal2-xss(49213)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html" xml:lang="en">FEDORA-2009-11374</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html" xml:lang="en">FEDORA-2009-11352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html" xml:lang="en">FEDORA-2009-11356</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0782">
    <vuln:cve-id>CVE-2009-0782</vuln:cve-id>
    <vuln:published-datetime>2009-03-26T06:12:11.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-26T06:12:11.797-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0783">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.3:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.9:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.29"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.31"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:4.1.36"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.24"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.25"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.26"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:5.5.27"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.0:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.6:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.7:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.8:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.9:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apache:tomcat:6.0.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:tomcat:4.1.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.3:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.9:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.28</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.29</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.31</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:4.1.36</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.18</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.19</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.20</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.21</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.22</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.23</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.24</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.25</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.26</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:5.5.27</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.0:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.2:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.3</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.5</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.6:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.7:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.8:alpha</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.9:beta</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.10</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.11</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.12</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.13</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.14</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.15</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.16</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.17</vuln:product>
      <vuln:product>cpe:/a:apache:tomcat:6.0.18</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0783</vuln:cve-id>
    <vuln:published-datetime>2009-06-05T12:00:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-10-09T18:58:03.930-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10716" name="oval:org.mitre.oval:def:10716"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18913" name="oval:org.mitre.oval:def:18913"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6450" name="oval:org.mitre.oval:def:6450"/>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" xml:lang="en">APPLE-SA-2010-03-29-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127420533226623&amp;w=2" xml:lang="en">HPSBMA02535</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=129070310906557&amp;w=2" xml:lang="en">HPSBUX02579</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=136485229118404&amp;w=2" xml:lang="en">HPSBUX02860</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1" xml:lang="en">263529</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4077" xml:lang="en">http://support.apple.com/kb/HT4077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=652592&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=652592&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=681156&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=681156&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=739522&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=739522&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=781542&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=781542&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?rev=781708&amp;view=rev" xml:lang="en">http://svn.apache.org/viewvc?rev=781708&amp;view=rev</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-4.html" xml:lang="en">http://tomcat.apache.org/security-4.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-5.html" xml:lang="en">http://tomcat.apache.org/security-5.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tomcat.apache.org/security-6.html" xml:lang="en">http://tomcat.apache.org/security-6.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2011/dsa-2207" xml:lang="en">DSA-2207</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:136" xml:lang="en">MDVSA-2009:136</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:138" xml:lang="en">MDVSA-2009:138</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:176" xml:lang="en">MDVSA-2010:176</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504090/100/0/threaded" xml:lang="en">20090604 [SECURITY] CVE-2009-0783 Apache Tomcat Information disclosure</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35416" xml:lang="en">35416</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022336" xml:lang="en">1022336</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1856" xml:lang="en">ADV-2009-1856</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/3056" xml:lang="en">ADV-2010-3056</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/51195" xml:lang="en">tomcat-xml-information-disclosure(51195)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936" xml:lang="en">https://issues.apache.org/bugzilla/show_bug.cgi?id=29936</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933" xml:lang="en">https://issues.apache.org/bugzilla/show_bug.cgi?id=45933</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E" xml:lang="en">[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html" xml:lang="en">FEDORA-2009-11374</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html" xml:lang="en">FEDORA-2009-11352</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html" xml:lang="en">FEDORA-2009-11356</vuln:reference>
    </vuln:references>
    <vuln:summary>Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0784">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:systemtap:systemtap"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:systemtap:systemtap</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0784</vuln:cve-id>
    <vuln:published-datetime>2009-03-25T19:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:02.310-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11613" name="oval:org.mitre.oval:def:11613"/>
    <vuln:cwe id="CWE-362"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-110.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1755" xml:lang="en">DSA-1755</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0373.html" xml:lang="en">RHSA-2009:0373</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0907" xml:lang="en">ADV-2009-0907</vuln:reference>
    </vuln:references>
    <vuln:summary>Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to insert arbitrary SystemTap kernel modules and gain privileges via unknown vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0786">
    <vuln:cve-id>CVE-2009-0786</vuln:cve-id>
    <vuln:published-datetime>2009-05-22T07:53:45.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-05-22T07:53:45.843-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This was originally intended for a report about TCP Wrappers and the hosts_ctl API function, but further investigation showed that this was documented behavior by that function.  Notes: Future CVE identifiers might be assigned to applications that mis-use the API in a security-relevant fashion.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0787">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0787</vuln:cve-id>
    <vuln:published-datetime>2009-03-24T21:30:00.453-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:16.627-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11068" name="oval:org.mitre.oval:def:11068"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8319" name="oval:org.mitre.oval:def:8319"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8faece5f906725c10e7a1f6caf84452abadbdc7b" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8faece5f906725c10e7a1f6caf84452abadbdc7b</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0473.html" xml:lang="en">RHSA-2009:0473</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9" xml:lang="en">http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34216" xml:lang="en">34216</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022177" xml:lang="en">1022177</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0802" xml:lang="en">ADV-2009-0802</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49355" xml:lang="en">linux-kernel-ecryptfs-information-disclosure(49355)</vuln:reference>
    </vuln:references>
    <vuln:summary>The ecryptfs_write_metadata_to_contents function in the eCryptfs functionality in the Linux kernel 2.6.28 before 2.6.28.9 uses an incorrect size when writing kernel memory to an eCryptfs file header, which triggers an out-of-bounds read and allows local users to obtain portions of kernel memory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0788">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:redhat:network_satellite_server:5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:redhat:network_satellite_server:5.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:redhat:network_satellite_server:5.3</vuln:product>
      <vuln:product>cpe:/a:redhat:network_satellite_server:5.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0788</vuln:cve-id>
    <vuln:published-datetime>2011-04-18T13:55:00.843-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:01.117-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2011-0434.html" xml:lang="en">RHSA-2011:0434</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/47316" xml:lang="en">47316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1025316" xml:lang="en">1025316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0967" xml:lang="en">ADV-2011-0967</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=491365" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=491365</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/66691" xml:lang="en">rhnss-url-security-bypass(66691)</vuln:reference>
    </vuln:references>
    <vuln:summary>Red Hat Network (RHN) Satellite Server 5.3 and 5.4 does not properly rewrite unspecified URLs, which allows remote attackers to (1) obtain unspecified sensitive host information or (2) use the server as an inadvertent proxy to connect to arbitrary services and IP addresses via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0789">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.1c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.2b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.3a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.5a:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6a:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6j"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6k"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6l"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.6m"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7j"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7k"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7l"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.7m"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8a"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8b"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8c"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8d"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8e"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8f"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8g"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8h"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8i"/>
        <cpe-lang:fact-ref name="cpe:/a:openssl:openssl:0.9.8j"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:openssl:openssl:0.9.1c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.2b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.3a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.4</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.5a:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6a:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6j</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6k</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6l</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.6m</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta1</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta2</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta3</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta4</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta5</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7:beta6</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7j</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7k</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7l</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.7m</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8a</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8b</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8c</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8d</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8e</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8f</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8g</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8h</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8i</vuln:product>
      <vuln:product>cpe:/a:openssl:openssl:0.9.8j</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0789</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.140-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:01.207-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>NETBSD</vuln:source>
      <vuln:reference href="ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc" xml:lang="en">NetBSD-SA2009-008</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" xml:lang="en">APPLE-SA-2009-09-10-2</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html" xml:lang="en">openSUSE-SU-2011:0845</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html" xml:lang="en">SUSE-SU-2011:0847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124464882609472&amp;w=2" xml:lang="en">SSRT090059</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=127678688104458&amp;w=2" xml:lang="en">HPSBOV02540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021906" xml:lang="en">1021906</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=671059&amp;group_id=116847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3865" xml:lang="en">http://support.apple.com/kb/HT3865</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html" xml:lang="en">http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openssl.org/news/secadv_20090325.txt" xml:lang="en">http://www.openssl.org/news/secadv_20090325.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.php.net/archive/2009.php#id2009-04-08-1" xml:lang="en">http://www.php.net/archive/2009.php#id2009-04-08-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34256" xml:lang="en">34256</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0850" xml:lang="en">ADV-2009-0850</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1020" xml:lang="en">ADV-2009-1020</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1175" xml:lang="en">ADV-2009-1175</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1548" xml:lang="en">ADV-2009-1548</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49433" xml:lang="en">openssl-asn1-structure-dos(49433)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://kb.bluecoat.com/index?page=content&amp;id=SA50" xml:lang="en">https://kb.bluecoat.com/index?page=content&amp;id=SA50</vuln:reference>
    </vuln:references>
    <vuln:summary>OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0790">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.0a"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:2.8.8"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:strongswan:strongswan:4.2.13"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.5"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.9"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.03"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.04"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.05"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.06"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.07"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.08"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.09"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/a:xelerance:openswan:2.6.20"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.0</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.0a</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.1</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.2</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.3</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.4.4</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.6.0</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.6.1</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.6.2</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.6.3</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.6.4</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.0</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.1</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.2</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.3</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.4</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.5</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.6</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.7</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:2.8.8</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.0</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.1</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.2</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.3</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.4</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.5</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.6</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.7</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.8</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.9</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.10</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.11</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.12</vuln:product>
      <vuln:product>cpe:/a:strongswan:strongswan:4.2.13</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.0</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.1</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.2</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.3</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.4</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.5</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.9</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.4.10</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.03</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.04</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.05</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.06</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.07</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.08</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.09</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.10</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.11</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.12</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.13</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.14</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.15</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.16</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.17</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.18</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.19</vuln:product>
      <vuln:product>cpe:/a:xelerance:openswan:2.6.20</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0790</vuln:cve-id>
    <vuln:published-datetime>2009-04-01T06:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-07-29T10:24:46.720-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11171" name="oval:org.mitre.oval:def:11171"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://download.strongswan.org/CHANGES4.txt" xml:lang="en">http://download.strongswan.org/CHANGES4.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1759" xml:lang="en">DSA-1759</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1760" xml:lang="en">DSA-1760</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt" xml:lang="en">http://www.openswan.org/CVE-2009-0790/CVE-2009-0790.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0402.html" xml:lang="en">RHSA-2009:0402</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502270/100/0/threaded" xml:lang="en">20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan &amp; Strongswan IPsec</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34296" xml:lang="en">34296</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021949" xml:lang="en">1021949</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021950" xml:lang="en">1021950</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0886" xml:lang="en">ADV-2009-0886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49523" xml:lang="en">openswan-strongswan-dpd-dos(49523)</vuln:reference>
    </vuln:references>
    <vuln:summary>The pluto IKE daemon in Openswan and Strongswan IPsec 2.6 before 2.6.21 and 2.4 before 2.4.14, and Strongswan 4.2 before 4.2.14 and 2.8 before 2.8.9, allows remote attackers to cause a denial of service (daemon crash and restart) via a crafted (1) R_U_THERE or (2) R_U_THERE_ACK Dead Peer Detection (DPD) IPsec IKE Notification message that triggers a NULL pointer dereference related to inconsistent ISAKMP state and the lack of a phase2 state association in DPD.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0791">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0791</vuln:cve-id>
    <vuln:published-datetime>2009-06-09T13:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:02.543-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10534" name="oval:org.mitre.oval:def:10534"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1022326" xml:lang="en">1022326</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:334" xml:lang="en">MDVSA-2009:334</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-1083.html" xml:lang="en">RHSA-2009:1083</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/35195" xml:lang="en">35195</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1488" xml:lang="en">ADV-2009-1488</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2928" xml:lang="en">ADV-2009-2928</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=491840" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=491840</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50941" xml:lang="en">cups-pdftops-filter-bo(50941)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1500.html" xml:lang="en">RHSA-2009:1500</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1501.html" xml:lang="en">RHSA-2009:1501</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1502.html" xml:lang="en">RHSA-2009:1502</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1503.html" xml:lang="en">RHSA-2009:1503</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-1512.html" xml:lang="en">RHSA-2009:1512</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0792">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:5.50"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.05"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:7.07"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.15.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.54"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.56"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.57"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.61"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.62"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.63"/>
        <cpe-lang:fact-ref name="cpe:/a:ghostscript:ghostscript:8.64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:0.7.0:beta_8"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:argyllcms:argyllcms:1.0.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.1.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.1</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.2.2</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.3.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.6.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:0.7.0:beta_8</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.0</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.2</vuln:product>
      <vuln:product>cpe:/a:argyllcms:argyllcms:1.0.3</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:5.50</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.05</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:7.07</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.0.1</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.15.2</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.54</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.56</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.57</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.61</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.62</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.63</vuln:product>
      <vuln:product>cpe:/a:ghostscript:ghostscript:8.64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0792</vuln:cve-id>
    <vuln:published-datetime>2009-04-14T12:26:56.110-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:20.503-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207" name="oval:org.mitre.oval:def:11207"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html" xml:lang="en">SUSE-SR:2009:009</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html" xml:lang="en">SUSE-SR:2009:011</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-201412-17.xml" xml:lang="en">GLSA-201412-17</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1" xml:lang="en">262288</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0060" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0060</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:095" xml:lang="en">MDVSA-2009:095</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:096" xml:lang="en">MDVSA-2009:096</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0420.html" xml:lang="en">RHSA-2009:0420</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0421.html" xml:lang="en">RHSA-2009:0421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502757/100/0/threaded" xml:lang="en">20090417 rPSA-2009-0060-1 ghostscript</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1708" xml:lang="en">ADV-2009-1708</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=491853" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=491853</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50381" xml:lang="en">ghostscript-icc-bo(50381)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="https://usn.ubuntu.com/757-1/" xml:lang="en">USN-757-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html" xml:lang="en">FEDORA-2009-3430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html" xml:lang="en">FEDORA-2009-3435</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html" xml:lang="en">FEDORA-2009-3709</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html" xml:lang="en">FEDORA-2009-3710</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0793">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:littlecms:lcms:1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:sun:openjdk:6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:littlecms:lcms:1.18</vuln:product>
      <vuln:product>cpe:/a:sun:openjdk:6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0793</vuln:cve-id>
    <vuln:published-datetime>2009-04-09T11:08:35.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:02.717-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11340" name="oval:org.mitre.oval:def:11340"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-19.xml" xml:lang="en">GLSA-200904-19</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1769" xml:lang="en">DSA-1769</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:121" xml:lang="en">MDVSA-2009:121</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:137" xml:lang="en">MDVSA-2009:137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:162" xml:lang="en">MDVSA-2009:162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34411" xml:lang="en">34411</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34420" xml:lang="en">34420</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-1043-1" xml:lang="en">USN-1043-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0963" xml:lang="en">ADV-2009-0963</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0964" xml:lang="en">ADV-2009-0964</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2011/0087" xml:lang="en">ADV-2011-0087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=492353" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=492353</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="https://rhn.redhat.com/errata/RHSA-2009-0377.html" xml:lang="en">RHSA-2009:0377</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00203.html" xml:lang="en">FEDORA-2009-3425</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00204.html" xml:lang="en">FEDORA-2009-3426</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00233.html" xml:lang="en">FEDORA-2009-3914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00285.html" xml:lang="en">FEDORA-2009-3967</vuln:reference>
    </vuln:references>
    <vuln:summary>cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0794">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sun:openjdk:1.6.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:openjdk:1.6.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0794</vuln:cve-id>
    <vuln:published-datetime>2009-04-13T12:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:01.537-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2009-February/004729.html" xml:lang="en">[distro-pkg-dev] 20090211 changeset in /hg/icedtea6: 2009-02-11 Omair Majid &lt;omajid at redh...</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:137" xml:lang="en">MDVSA-2009:137</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:162" xml:lang="en">MDVSA-2009:162</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0965" xml:lang="en">ADV-2009-0965</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=492367" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=492367</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50383" xml:lang="en">pulsejava--pulseaudiotargetdatal-dos(50383)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00203.html" xml:lang="en">FEDORA-2009-3425</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00204.html" xml:lang="en">FEDORA-2009-3426</vuln:reference>
    </vuln:references>
    <vuln:summary>Integer overflow in the PulseAudioTargetDataL class in src/java/org/classpath/icedtea/pulseaudio/PulseAudioTargetDataLine.java in Pulse-Java, as used in OpenJDK 1.6.0.0 and other products, allows remote attackers to cause a denial of service (applet crash) via a crafted Pulse Audio source data line.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0795">
    <vuln:cve-id>CVE-2009-0795</vuln:cve-id>
    <vuln:published-datetime>2009-04-07T21:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-07T21:30:00.453-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0796, CVE-2009-1265.  Reason: this candidate was intended for one issue, but a typo caused it to be associated with a different issue.  Notes: All CVE users should consult CVE-2009-0796 and CVE-2009-1265 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0796">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apache:mod_perl:1"/>
          <cpe-lang:fact-ref name="cpe:/a:apache:mod_perl:2"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:apache:http_server"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apache:mod_perl:1</vuln:product>
      <vuln:product>cpe:/a:apache:mod_perl:2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0796</vuln:cve-id>
    <vuln:published-datetime>2009-04-07T19:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:24.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>2.6</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8488" name="oval:org.mitre.oval:def:8488"/>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" xml:lang="en">APPLE-SA-2010-11-10-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1" xml:lang="en">1021508</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021709.1-1" xml:lang="en">1021709</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT4435" xml:lang="en">http://support.apple.com/kb/HT4435</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&amp;r2=761081&amp;pathrev=761081&amp;diff_format=h" xml:lang="en">http://svn.apache.org/viewvc/perl/modperl/branches/1.x/lib/Apache/Status.pm?r1=177851&amp;r2=761081&amp;pathrev=761081&amp;diff_format=h</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://svn.apache.org/viewvc?view=rev&amp;revision=761081" xml:lang="en">http://svn.apache.org/viewvc?view=rev&amp;revision=761081</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gossamer-threads.com/lists/modperl/modperl/99475#99475" xml:lang="en">[modperl] 20090401 [SECURITY] [CVE-2009-0796] Vulnerability found in Apache::Status and Apache2::Status</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.gossamer-threads.com/lists/modperl/modperl-cvs/99477#99477" xml:lang="en">[modperl-cvs] 20090401 svn commit: r761081 - in /perl/modperl/branches/1.x: Changes lib/Apache/Status.pm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:091" xml:lang="en">MDVSA-2009:091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502709/100/0/threaded" xml:lang="en">20090415 XSS with mod_perl perl_status utility</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34383" xml:lang="en">34383</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021988" xml:lang="en">1021988</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0943" xml:lang="en">ADV-2009-0943</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=494402" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=494402</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://launchpad.net/bugs/cve/2009-0796" xml:lang="en">https://launchpad.net/bugs/cve/2009-0796</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Status.pm in Apache::Status and Apache2::Status in mod_perl1 and mod_perl2 for the Apache HTTP Server, when /perl-status is accessible, allows remote attackers to inject arbitrary web script or HTML via the URI.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0797">
    <vuln:cve-id>CVE-2009-0797</vuln:cve-id>
    <vuln:published-datetime>2017-05-26T17:29:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-05-26T17:29:00.217-04:00</vuln:last-modified-datetime>
    <vuln:summary>** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0798">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:0.99.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:0.99.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:0.99.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tim_hockin:acpid:20010510"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tim_hockin:acpid:0.99.0</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:0.99.1</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:0.99.4</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.0</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.1</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.2</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.3</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.4</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.6</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:1.0.8</vuln:product>
      <vuln:product>cpe:/a:tim_hockin:acpid:20010510</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0798</vuln:cve-id>
    <vuln:published-datetime>2009-04-24T11:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:02.857-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7560" name="oval:org.mitre.oval:def:7560"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9955" name="oval:org.mitre.oval:def:9955"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1786" xml:lang="en">DSA-1786</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://www.gentoo.org/security/en/glsa/glsa-200905-06.xml" xml:lang="en">GLSA-200905-06</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:107" xml:lang="en">MDVSA-2009:107</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0474.html" xml:lang="en">RHSA-2009:0474</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34692" xml:lang="en">34692</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022182" xml:lang="en">1022182</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-766-1" xml:lang="en">USN-766-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=494443" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=494443</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=502583" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=502583</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/50060" xml:lang="en">acpid-socket-dos(50060)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01342.html" xml:lang="en">FEDORA-2009-5578</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01365.html" xml:lang="en">FEDORA-2009-5608</vuln:reference>
    </vuln:references>
    <vuln:summary>ACPI Event Daemon (acpid) before 1.0.10 allows remote attackers to cause a denial of service (CPU consumption and connectivity loss) by opening a large number of UNIX sockets without closing them, which triggers an infinite loop.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0799">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.90"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.91"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.11</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.2.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.9</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.90</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.91</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.5</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.6</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.7</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0799</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.703-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10204" name="oval:org.mitre.oval:def:10204"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=495886" xml:lang="en">http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=495886</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://poppler.freedesktop.org/releases.html" xml:lang="en">http://poppler.freedesktop.org/releases.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/196617" xml:lang="en">VU#196617</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:175" xml:lang="en">MDVSA-2011:175</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0430.html" xml:lang="en">RHSA-2009:0430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0431.html" xml:lang="en">RHSA-2009:0431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022072" xml:lang="en">1022072</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1065" xml:lang="en">ADV-2009-1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1066" xml:lang="en">ADV-2009-1066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1076" xml:lang="en">ADV-2009-1076</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1077" xml:lang="en">ADV-2009-1077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html" xml:lang="en">FEDORA-2009-6972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html" xml:lang="en">FEDORA-2009-6973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html" xml:lang="en">FEDORA-2009-6982</vuln:reference>
    </vuln:references>
    <vuln:summary>The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0800">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.5a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.7a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.91c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92d"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.92e"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93a"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93b"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:0.93c"/>
        <cpe-lang:fact-ref name="cpe:/a:foolabs:xpdf:1.00a"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.80"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.90"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.91"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.92"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:0.93"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:1.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.02"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:2.03"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.01"/>
        <cpe-lang:fact-ref name="cpe:/a:glyphandcog:xpdfreader:3.02"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.9"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.90"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.5.91"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.7.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.5"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.6"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.8.7"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.4"/>
        <cpe-lang:fact-ref name="cpe:/a:poppler:poppler:0.10.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.5-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.6-3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.9-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.10-1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.19:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.20:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.21:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.22:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.1.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.11"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.2.12"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.7"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.8"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.9"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:apple:cups:1.3.11"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:apple:cups:1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.5-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.6-3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.9-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.10-1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.13</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.14</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.15</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.16</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.17</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.18</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.19:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.20:rc6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.21:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.22:rc2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.1.23:rc1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.11</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.2.12</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.0</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.1</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.2</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.3</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.4</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.5</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.6</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.7</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.8</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.9</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.10</vuln:product>
      <vuln:product>cpe:/a:apple:cups:1.3.11</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.5a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.7a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.91c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92d</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.92e</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93a</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93b</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:0.93c</vuln:product>
      <vuln:product>cpe:/a:foolabs:xpdf:1.00a</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.2</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.3</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.4</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.5</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.6</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.7</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.80</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.90</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.91</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.92</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:0.93</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:1.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.02</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:2.03</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.00</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.01</vuln:product>
      <vuln:product>cpe:/a:glyphandcog:xpdfreader:3.02</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.1.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.2.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.3.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.4.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.9</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.90</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.5.91</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.6.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.7.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.5</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.6</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.8.7</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.9.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.0</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.1</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.2</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.3</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.4</vuln:product>
      <vuln:product>cpe:/a:poppler:poppler:0.10.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0800</vuln:cve-id>
    <vuln:published-datetime>2009-04-23T13:30:01.717-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2019-03-06T11:30:38.330-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11323" name="oval:org.mitre.oval:def:11323"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html" xml:lang="en">SUSE-SA:2009:024</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" xml:lang="en">SUSE-SR:2009:010</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html" xml:lang="en">SUSE-SR:2009:012</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://poppler.freedesktop.org/releases.html" xml:lang="en">http://poppler.freedesktop.org/releases.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0458.html" xml:lang="en">RHSA-2009:0458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SLACKWARE</vuln:source>
      <vuln:reference href="http://slackware.com/security/viewer.php?l=slackware-security&amp;y=2009&amp;m=slackware-security.578477" xml:lang="en">SSA:2009-129-01</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1790" xml:lang="en">DSA-1790</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1793" xml:lang="en">DSA-1793</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/196617" xml:lang="en">VU#196617</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:101" xml:lang="en">MDVSA-2009:101</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2010:087" xml:lang="en">MDVSA-2010:087</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2011:175" xml:lang="en">MDVSA-2011:175</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0429.html" xml:lang="en">RHSA-2009:0429</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0430.html" xml:lang="en">RHSA-2009:0430</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0431.html" xml:lang="en">RHSA-2009:0431</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0480.html" xml:lang="en">RHSA-2009:0480</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34568" xml:lang="en">34568</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022073" xml:lang="en">1022073</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1065" xml:lang="en">ADV-2009-1065</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1066" xml:lang="en">ADV-2009-1066</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1076" xml:lang="en">ADV-2009-1076</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1077" xml:lang="en">ADV-2009-1077</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2010/1040" xml:lang="en">ADV-2010-1040</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=495887" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=495887</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html" xml:lang="en">FEDORA-2009-6972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html" xml:lang="en">FEDORA-2009-6973</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html" xml:lang="en">FEDORA-2009-6982</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0801">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:2.7.stable5"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:2.7.stable6"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_pre1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_pre2"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_pre3"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable1"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable2"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable3"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable4"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable5"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable6"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable7"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable12"/>
        <cpe-lang:fact-ref name="cpe:/a:squid:squid_web_proxy_cache:3.0_stable13"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:2.7</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:2.7.stable5</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:2.7.stable6</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_pre1</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_pre2</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_pre3</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable1</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable2</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable3</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable4</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable5</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable6</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable7</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable12</vuln:product>
      <vuln:product>cpe:/a:squid:squid_web_proxy_cache:3.0_stable13</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0801</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T11:30:00.170-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-18T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-04T12:38:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/435052" xml:lang="en">VU#435052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33858" xml:lang="en">33858</vuln:reference>
    </vuln:references>
    <vuln:summary>Squid, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0802">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.1_build_993"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.1_build_995"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.2_build_1000"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.2_build_1001"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.0.3_build_1005"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.1.1.1077"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:qbik:wingate:6.5.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:qbik:wingate:6.0.0</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.0.1_build_993</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.0.1_build_995</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.0.2_build_1000</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.0.2_build_1001</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.0.3_build_1005</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.1</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.1.1.1077</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.1.2</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.1.3</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.1.4</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.2</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.2.1</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.2.2</vuln:product>
      <vuln:product>cpe:/a:qbik:wingate:6.5.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0802</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T11:30:00.203-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-18T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-04T13:12:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/435052" xml:lang="en">VU#435052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33858" xml:lang="en">33858</vuln:reference>
    </vuln:references>
    <vuln:summary>Qbik WinGate, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0803">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:smoothwall:networkguardian:2008"/>
        <cpe-lang:fact-ref name="cpe:/a:smoothwall:schoolguardian:2008"/>
        <cpe-lang:fact-ref name="cpe:/a:smoothwall:smoothguardian:2008"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:smoothwall:networkguardian:2008</vuln:product>
      <vuln:product>cpe:/a:smoothwall:schoolguardian:2008</vuln:product>
      <vuln:product>cpe:/a:smoothwall:smoothguardian:2008</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0803</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T11:30:00.217-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-18T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-04T13:48:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/435052" xml:lang="en">VU#435052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/MAPG-7M6SM7" xml:lang="en">http://www.kb.cert.org/vuls/id/MAPG-7M6SM7</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33858" xml:lang="en">33858</vuln:reference>
    </vuln:references>
    <vuln:summary>SmoothWall SmoothGuardian, as used in SmoothWall Firewall, NetworkGuardian, and SchoolGuardian 2008, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0804">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ziproxy:ziproxy:2.6.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ziproxy:ziproxy:2.6.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0804</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T11:30:00.250-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-18T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.4</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>HIGH</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-04T14:02:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/435052" xml:lang="en">VU#435052</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/MAPG-7N9GN8" xml:lang="en">http://www.kb.cert.org/vuls/id/MAPG-7N9GN8</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33858" xml:lang="en">33858</vuln:reference>
    </vuln:references>
    <vuln:summary>Ziproxy 2.6.0, when transparent interception mode is enabled, uses the HTTP Host header to determine the remote endpoint, which allows remote attackers to bypass access controls for Flash, Java, Silverlight, and probably other technologies, and possibly communicate with restricted intranet sites, via a crafted web page that causes a client to send HTTP requests with a modified Host header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0805">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:mihai_bazon:pical:0.91h"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:xoops:xoops"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mihai_bazon:pical:0.91h</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0805</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.517-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T08:42:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVN</vuln:source>
      <vuln:reference href="http://jvn.jp/en/jp/JVN91591874/index.html" xml:lang="en">JVN#91591874</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>JVNDB</vuln:source>
      <vuln:reference href="http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000013.html" xml:lang="en">JVNDB-2009-000013</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33896" xml:lang="en">33896</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://xoops.peak.ne.jp/md/news/" xml:lang="en">http://xoops.peak.ne.jp/md/news/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://xoops.peak.ne.jp/md/news/index.php?page=article&amp;storyid=476&amp;easiestml_lang=xlang%3Aen" xml:lang="en">http://xoops.peak.ne.jp/md/news/index.php?page=article&amp;storyid=476&amp;easiestml_lang=xlang%3Aen</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in piCal 0.91h and earlier, a module for XOOPS, allows remote attackers to inject arbitrary web script or HTML via the event_id parameter in index.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0806">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.1:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.2:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.3:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.4:alpha"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.5:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.5.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.5.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.6.4"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.6.6"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.1:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.1:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.2:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.2:beta_2"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.2:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:opengoo:opengoo:1.2:rc2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:opengoo:opengoo:0.1:alpha</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.2:alpha</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.3:alpha</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.4:alpha</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.5:beta</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.5.1:beta</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.5.2:beta</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.6.0</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.6.2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.6.4</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.6.6</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.7</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.7.1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.8</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.9</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.9:rc2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.9.1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:0.9.2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.0</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.0:rc1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.0:rc2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.0:rc3</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.1:beta</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.1:rc1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.1:rc2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.2:beta</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.2:beta_2</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.2:rc1</vuln:product>
      <vuln:product>cpe:/a:opengoo:opengoo:1.2:rc2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0806</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T08:53:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=663706" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=663706</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33897" xml:lang="en">33897</vuln:reference>
    </vuln:references>
    <vuln:summary>Unspecified vulnerability in OpenGoo before 1.2.1 allows remote authenticated users to modify their own permissions via unknown attack vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0807">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:zfeeder:zfeeder:1.6"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:zfeeder:zfeeder:1.6</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0807</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48866" xml:lang="en">zfeeder-admin-security-bypass(48866)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8092" xml:lang="en">8092</vuln:reference>
    </vuln:references>
    <vuln:summary>zFeeder 1.6 allows remote attackers to gain administrative access via a direct request to admin.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0808">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:simple_cmms:simplecmms:0.1.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:simple_cmms:simplecmms:0.1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0808</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:01.757-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=661656&amp;group_id=245458" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=661656&amp;group_id=245458</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0490" xml:lang="en">ADV-2009-0490</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48883" xml:lang="en">simplecmms-unspecified-sql-injection(48883)</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in SimpleCMMS before 0.1.0 allow remote attackers to execute arbitrary SQL commands via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0809">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:3ds:enovia_smarteam:5.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:catia:5.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:catia:5.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:catia:5.18"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:3ds:enovia_smarteam:5.18</vuln:product>
      <vuln:product>cpe:/a:ibm:catia:5.16</vuln:product>
      <vuln:product>cpe:/a:ibm:catia:5.17</vuln:product>
      <vuln:product>cpe:/a:ibm:catia:5.18</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0809</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.593-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-07-22T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T09:20:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33895" xml:lang="en">33895</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0525" xml:lang="en">ADV-2009-0525</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1HD80332" xml:lang="en">HD80332</vuln:reference>
    </vuln:references>
    <vuln:summary>The Web Editor in Dassault Systemes ENOVIA SmarTeam V5 before Release 18 Service Pack 8, and possibly CATIA and other products, allows remote authenticated users to read the profile card of an object in the document class via a link that is sent from the owner of the document object.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0810">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:xatrix:xguestbook:2.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:xatrix:xguestbook:2.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0810</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.263-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33875" xml:lang="en">33875</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0523" xml:lang="en">ADV-2009-0523</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48881" xml:lang="en">xguestbook-login-sql-injection(48881)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8101" xml:lang="en">8101</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in login.php in xGuestbook 2.0 allows remote attackers to execute arbitrary SQL commands via the user parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0811">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:sopcast:sopcore_activex_control:3.0.3.501"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sopcast:sopcore_activex_control:3.0.3.501</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0811</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:26.017-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://retrogod.altervista.org/9sg_sopcastia.html" xml:lang="en">http://retrogod.altervista.org/9sg_sopcastia.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501252/100/0/threaded" xml:lang="en">20090226 Sopcast SopCore Control (sopocx.ocx 3.0.3.501) SetExternalPlayer() user assisted remote code execution poc</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33920" xml:lang="en">33920</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48955" xml:lang="en">sopcast-setexternalplayer-code-execution(48955)</vuln:reference>
    </vuln:references>
    <vuln:summary>Insecure method vulnerability in the SopCast SopCore ActiveX control in sopocx.ocx 3.0.3.501 allows remote attackers to execute arbitrary programs via an executable file name in the argument to the SetExternalPlayer method.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0812">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.00"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.01"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.10"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.20"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.50"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.52"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.53"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:2.54"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:3.00"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:3.02"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:3.10"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:3.11"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.00"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.10"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.20"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.21"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.22"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:4.23"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:5.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:5.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:5.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:5.02"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:bpsoft:hex_workshop:6.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:1.0</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.00</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.01</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.10</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.20</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.50</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.52</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.53</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:2.54</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:3.00</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:3.02</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:3.10</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:3.11</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.00</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.10</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.20</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.21</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.22</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:4.23</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:5.0</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:5.1</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:5.1.3</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:5.1.4</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:5.02</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:6.0.0</vuln:product>
      <vuln:product>cpe:/a:bpsoft:hex_workshop:6.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0812</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T12:30:02.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:26.457-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="http://www.exploit-db.com/exploits/9550" xml:lang="en">9550</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501300/100/0/threaded" xml:lang="en">20090227 Hex Workshop &lt;= v6 (.hex) File Local Code</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33932" xml:lang="en">33932</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48970" xml:lang="en">hexworkshop-hex-bo(48970)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8121" xml:lang="en">8121</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in BreakPoint Software Hex Workshop 4.23, 6.0.1.4603, and other 6.x and earlier versions allows remote attackers to execute arbitrary code via a crafted Intel Hex Code (.hex) file. NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0813">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:imera:teamlinks:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:imera:teamlinks:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0813</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.530-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.373-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0591" xml:lang="en">ADV-2009-0591</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49028" xml:lang="en">imera-imeraieplugin-code-execution(49028)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8144" xml:lang="en">8144</vuln:reference>
    </vuln:references>
    <vuln:summary>Insecure method vulnerability in the ImeraIEPlugin ActiveX control (ImeraIEPlugin.dll 1.0.2.54) in Imera TeamLinks Client allows remote attackers to force the download and execution of arbitrary URLs via modified DownloadProtocol, DownloadHost, DownloadPort, and DownloadURI parameters.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0814">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:blogsa:blogsa:1.0beta3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:blogsa:blogsa:1.0beta3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0814</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.547-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:27.110-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501382/100/0/threaded" xml:lang="en">20090302 Blogsa &lt;= 1.0 Beta 3 XSS Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33957" xml:lang="en">33957</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49024" xml:lang="en">blogsa-widgets-xss(49024)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in Widgets.aspx in Blogsa 1.0 Beta 3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchText parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0815">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:3.3.x"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:3.5.x"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:3.6.x"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:3.7.x"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:3.8.x"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.3:alpha1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:3.3.x</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:3.5.x</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:3.6.x</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:3.7.x</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:3.8.x</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.3:alpha1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0815</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.563-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-04-27T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T12:21:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1720" xml:lang="en">DSA-1720</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/10/6" xml:lang="en">[oss-security] 20090210 CVE request: typo3 xss (typo3-sa-2009-002)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021710" xml:lang="en">1021710</vuln:reference>
    </vuln:references>
    <vuln:summary>The jumpUrl mechanism in class.tslib_fe.php in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 leaks a hash secret (juHash) in an error message, which allows remote attackers to read arbitrary files by including the hash in a request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0816">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.7"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.1.9"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:typo3:typo3:4.2.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:typo3:typo3:4.0</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.10</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.0.11</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.5</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.6</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.7</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.8</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.1.9</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.1</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.2</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.3</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.4</vuln:product>
      <vuln:product>cpe:/a:typo3:typo3:4.2.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0816</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2010-04-27T01:49:50.127-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/" xml:lang="en">http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-002/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1720" xml:lang="en">DSA-1720</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://www.openwall.com/lists/oss-security/2009/02/10/6" xml:lang="en">[oss-security] 20090210 CVE request: typo3 xss (typo3-sa-2009-002)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021709" xml:lang="en">1021709</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in the backend user interface in TYPO3 3.3.x through 3.8.x, 4.0 before 4.0.12, 4.1 before 4.1.10, 4.2 before 4.2.6, and 4.3alpha1 allow remote attackers to inject arbitrary web script or HTML via unspecified fields.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0817">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:5.x"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:5.x-1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:5.x-1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:5.x-1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:5.x-1.x-dev"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:6.x-1.0"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:6.x-1.2"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:6.x-1.3"/>
          <cpe-lang:fact-ref name="cpe:/a:drupal:protected_node_module:6.x-1.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:drupal"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:drupal:protected_node_module:5.x</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:5.x-1.0</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:5.x-1.2</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:5.x-1.3</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:5.x-1.x-dev</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:6.x-1.0</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:6.x-1.2</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:6.x-1.3</vuln:product>
      <vuln:product>cpe:/a:drupal:protected_node_module:6.x-1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0817</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:02.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/385950" xml:lang="en">http://drupal.org/node/385950</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/386604" xml:lang="en">http://drupal.org/node/386604</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/386606" xml:lang="en">http://drupal.org/node/386606</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://lampsecurity.org/node/28" xml:lang="en">http://lampsecurity.org/node/28</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0572" xml:lang="en">ADV-2009-0572</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48980" xml:lang="en">protectednode-passwordpage-xss(48980)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the Protected Node module 5.x before 5.x-1.4 and 6.x before 6.x-1.5, a module for Drupal, allows remote authenticated users with "administer site configuration" permissions to inject arbitrary web script or HTML via the Password page info field, which is not properly handled by the protected_node_enterpassword function in protected_node.module.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0818">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:taxonomy_theme_module:5.x-1.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:drupal:drupal"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:drupal:taxonomy_theme_module:5.x-1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0818</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:02.207-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/386940" xml:lang="en">http://drupal.org/node/386940</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://drupal.org/node/386942" xml:lang="en">http://drupal.org/node/386942</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33923" xml:lang="en">33923</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48979" xml:lang="en">drupal-taxonomy-name-xss(48979)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the taxonomy_theme_admin_table_builder function (taxonomy_theme_admin.inc) in Taxonomy Theme module before 5.x-1.2, a module for Drupal, allows remote authenticated users with the "administer taxonomy" permission, or the ability to create pages when tagging is enabled, to inject arbitrary web script or HTML via the Vocabulary name (name parameter) to index.php.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0819">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.21"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.22"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.23"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.23:a"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.23_bk"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.23a"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.24"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.25"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.26"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.27"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.28"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.29"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.30"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.31"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.31:sp1"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:5.1.32-bzr"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mysql:mysql:6.0.10-bzr"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mysql:mysql:5.1</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.1</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.2</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.3</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.10</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.11</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.12</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.13</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.14</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.15</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.16</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.17</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.18</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.19</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.20</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.21</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.22</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.23</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.23:a</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.23_bk</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.23a</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.24</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.25</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.26</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.27</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.28</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.29</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.30</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.31</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.31:sp1</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:5.1.32-bzr</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.0</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.1</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.2</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.3</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.4</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.9</vuln:product>
      <vuln:product>cpe:/a:mysql:mysql:6.0.10-bzr</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0819</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.450-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" name="oval:org.mitre.oval:def:7544"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.mysql.com/bug.php?id=42495" xml:lang="en">http://bugs.mysql.com/bug.php?id=42495</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" xml:lang="en">http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" xml:lang="en">http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33972" xml:lang="en">33972</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021786" xml:lang="en">1021786</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0594" xml:lang="en">ADV-2009-0594</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" xml:lang="en">mysql-xpath-dos(49050)</vuln:reference>
    </vuln:references>
    <vuln:summary>sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0820">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.0.0rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.0_rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.0:beta"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.9"/>
        <cpe-lang:fact-ref name="cpe:/a:php.brickhost:phpscheduleit:1.2.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.0</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.0.0rc1</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.0_rc1</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.0</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.0:beta</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.1</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.2</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.3</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.4</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.5</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.6</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.7</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.8</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.9</vuln:product>
      <vuln:product>cpe:/a:php.brickhost:phpscheduleit:1.2.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0820</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T13:43:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-94"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/check.php?r1=318&amp;r2=332" xml:lang="en">http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/check.php?r1=318&amp;r2=332</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&amp;r2=328" xml:lang="en">http://phpscheduleit.svn.sourceforge.net/viewvc/phpscheduleit/1.2.11/reserve.php?r1=318&amp;r2=328</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=662749" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=662749</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0491" xml:lang="en">ADV-2009-0491</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple eval injection vulnerabilities in phpScheduleIt before 1.2.11 allow remote attackers to execute arbitrary code via (1) the end_date parameter to reserve.php and (2) the start_date and end_date parameters to check.php.  NOTE: the start_date/reserve.php vector is already covered by CVE-2008-6132.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0821">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9:rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.9_rc"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:0.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0:preview_release"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.6::linux"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.5.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:1.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:beta_1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.9"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_.10"/>
        <cpe-lang:fact-ref name="cpe:/a:mozilla:firefox:2.0_8"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mozilla:firefox:0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.6.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.7.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9:rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.9_rc</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:0.10.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0:preview_release</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.6::linux</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5:beta2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.5.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:1.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:beta_1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0:rc3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.2</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.3</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.8</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.11</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.12</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.13</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.14</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.15</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.16</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.17</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.18</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.19</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0.0.20</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.1</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.4</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.5</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.6</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.7</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.9</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_.10</vuln:product>
      <vuln:product>cpe:/a:mozilla:firefox:2.0_8</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0821</vuln:cve-id>
    <vuln:published-datetime>2009-03-04T21:30:00.703-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-05T00:00:00.000-05:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-05T13:58:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://downloads.securityfocus.com/vulnerabilities/exploits/33969.html" xml:lang="en">http://downloads.securityfocus.com/vulnerabilities/exploits/33969.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33969" xml:lang="en">33969</vuln:reference>
    </vuln:references>
    <vuln:summary>Mozilla Firefox 2.0.0.20 and earlier allows remote attackers to cause a denial of service (application crash) via nested calls to the window.print function, as demonstrated by a window.print(window.print()) in the onclick attribute of an INPUT element.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0824">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:slysoft:anydvd:6.5.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:slysoft:clonecd:5.3.1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:slysoft:clonedvd:2.9.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:slysoft:virtualclonedrive:5.4.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:slysoft:anydvd:6.5.2.2</vuln:product>
      <vuln:product>cpe:/a:slysoft:clonecd:5.3.1.3</vuln:product>
      <vuln:product>cpe:/a:slysoft:clonedvd:2.9.2.0</vuln:product>
      <vuln:product>cpe:/a:slysoft:virtualclonedrive:5.4.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0824</vuln:cve-id>
    <vuln:published-datetime>2009-03-14T14:30:00.547-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:27.440-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://en.securitylab.ru/lab/PT-2009-11" xml:lang="en">http://en.securitylab.ru/lab/PT-2009-11</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501713/100/0/threaded" xml:lang="en">20090312 [Suspected Spam][PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34103" xml:lang="en">34103</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.slysoft.com/download/changes_anydvd.txt" xml:lang="en">http://www.slysoft.com/download/changes_anydvd.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.slysoft.com/download/changes_clonedvd.txt" xml:lang="en">http://www.slysoft.com/download/changes_clonedvd.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49232" xml:lang="en">slysoft-elbycdio-dos(49232)</vuln:reference>
    </vuln:references>
    <vuln:summary>Elaborate Bytes ElbyCDIO.sys 6.0.2.0 and earlier, as distributed in SlySoft AnyDVD before 6.5.2.6, Virtual CloneDrive 5.4.2.3 and earlier, CloneDVD 2.9.2.0 and earlier, and CloneCD 5.3.1.3 and earlier, uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate a buffer associated with the Irp object, which allows local users to cause a denial of service (system crash) via a crafted IOCTL call.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0825">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:torben_sorensen:tinx%2fcms:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:torben_sorensen:tinx%2fcms:3.5"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:torben_sorensen:tinx%2fcms:3.0</vuln:product>
      <vuln:product>cpe:/a:torben_sorensen:tinx%2fcms:3.5</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0825</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:28.457-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://en.securitylab.ru/lab/PT-2009-13" xml:lang="en">http://en.securitylab.ru/lab/PT-2009-13</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/showfiles.php?group_id=133415" xml:lang="en">http://sourceforge.net/project/showfiles.php?group_id=133415</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?group_id=133415&amp;release_id=658540" xml:lang="en">http://sourceforge.net/project/shownotes.php?group_id=133415&amp;release_id=658540</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501547/100/0/threaded" xml:lang="en">20090306 [Positive Technologies SA:2009-13] TinX CMS 3.x SQL Injection Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34021" xml:lang="en">34021</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49115" xml:lang="en">tinxcms-rss-sql-injection(49115)</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in system/rss.php in TinX/cms 3.x before 3.5.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0826">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:freedville:bloghelper:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freedville:bloghelper:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0826</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.577-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.513-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47799" xml:lang="en">bloghelper-commondb-info-disclosure(47799)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7689" xml:lang="en">7689</vuln:reference>
    </vuln:references>
    <vuln:summary>BlogHelper stores common_db.inc under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0827">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:freedville:pollhelper:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freedville:pollhelper:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0827</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.610-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.560-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/47797" xml:lang="en">pollhelper-poll-info-disclosure(47797)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7690" xml:lang="en">7690</vuln:reference>
    </vuln:references>
    <vuln:summary>PollHelper stores poll.inc under the web root with insufficient access control, which allows remote attackers to download the database file containing user credentials via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0828">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:freedville:quotebook:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:freedville:quotebook:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0828</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.623-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33166" xml:lang="en">33166</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7699" xml:lang="en">7699</vuln:reference>
    </vuln:references>
    <vuln:summary>QuoteBook stores quotes.inc under the web root with insufficient access control, which allows remote attackers to obtain sensitive database information, including user credentials, via a direct request.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0829">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:andrew_freed:quotebook:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:andrew_freed:quotebook:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0829</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.640-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:55:03.217-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33166" xml:lang="en">33166</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in QuoteBook allow remote attackers to execute arbitrary SQL commands via the (1) MyBox and (2) selectFavorites parameters to (a) quotes.php and the (3) QuoteName and (4) QuoteText parameters to (b) quotesadd.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0830">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:andrew_freed:quotebook:-"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:andrew_freed:quotebook:-</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0830</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:55:03.327-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33166" xml:lang="en">33166</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in QuoteBook allows remote attackers to inject arbitrary web script or HTML via the (1) QuoteName and (2) QuoteText parameters to quotesadd.php.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0831">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:php-fusion:members_cv_module:1.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:php-fusion:php-fusion"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:php-fusion:members_cv_module:1.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0831</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.687-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.670-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33156" xml:lang="en">33156</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7697" xml:lang="en">7697</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in members.php in the Members CV (job) module 1.0 for PHP-Fusion, when magic_quotes_gpc is disabled, allows remote authenticated users to execute arbitrary SQL commands via the sortby parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0832">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ausimods:e-cart:1.3"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:php-fusion:php-fusion"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ausimods:e-cart:1.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0832</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.703-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:29.097-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/499835/100/0/threaded" xml:lang="en">20090107 PHP-Fusion Mod E-Cart Sql Injection</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33155" xml:lang="en">33155</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7698" xml:lang="en">7698</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in items.php in the E-Cart module 1.3 for PHP-Fusion allows remote attackers to execute arbitrary SQL commands via the CA parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0833">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:myplugins:gen_msn:0.31"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:nullsoft:winamp:5.541"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:myplugins:gen_msn:0.31</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0833</vuln:cve-id>
    <vuln:published-datetime>2009-03-05T15:30:00.717-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:03.793-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>9.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15659" name="oval:org.mitre.oval:def:15659"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33159" xml:lang="en">33159</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/7696" xml:lang="en">7696</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer overflow in gen_msn.dll in the gen_msn plugin 0.31 for Winamp 5.541 allows remote attackers to execute arbitrary code via a playlist (.pls) file with a long URL in the File1 field.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0834">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.0"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.8.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.9:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.11.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.12.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.13.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.14.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.15.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.46"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.47"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.48"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.49"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.50"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.55"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.56"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.57"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.58"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.59"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.60"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.61"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.16.62"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.17.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.18.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.19.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.20.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.21.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.22.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.23.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.24.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.26.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27:rc9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.7"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.8"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.9"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.10"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.11"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.12"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.13"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.14"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.15"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.16"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.17"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.18"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.19"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.20"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.21"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.22"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.23"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.24"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.25"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.26"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.27"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.29"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.30"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.31"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.32"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.33"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.34"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.35"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.36"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.37"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.38"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.39"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.40"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.41"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.42"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.43"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.44"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.45"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.51"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.52"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.53"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.27.54"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.1"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.2"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.3"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.5"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.6"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.7"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.0</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.8.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.9:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.11.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.12.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.13.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.14.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.15.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.46</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.47</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.48</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.49</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.50</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.55</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.56</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.57</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.58</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.59</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.60</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.61</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.16.62</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.17.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.18.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.19.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.20.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.21.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.22.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.23.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.24.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.26.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27:rc9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.7</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.8</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.9</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.10</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.11</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.12</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.13</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.14</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.15</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.16</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.17</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.18</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.19</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.20</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.21</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.22</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.23</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.24</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.25</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.26</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.27</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.29</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.30</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.31</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.32</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.33</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.34</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.35</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.36</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.37</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.38</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.39</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.40</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.41</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.42</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.43</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.44</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.45</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.51</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.52</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.53</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.27.54</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.1</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.2</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.3</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.5</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.6</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.7</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0834</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T06:30:02.627-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:29.567-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8508" name="oval:org.mitre.oval:def:8508"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9600" name="oval:org.mitre.oval:def:9600"/>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ccbe495caa5e604b04d5a31d7459a6f6a76a756c</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" xml:lang="en">SUSE-SA:2009:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123579056530191&amp;w=2" xml:lang="en">[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123579065130246&amp;w=2" xml:lang="en">[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=oss-security&amp;m=123597642832637&amp;w=2" xml:lang="en">[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0459.html" xml:lang="en">RHSA-2009:0459</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0473.html" xml:lang="en">RHSA-2009:0473</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-001.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0084" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1800" xml:lang="en">DSA-1800</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:118" xml:lang="en">MDVSA-2009:118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0451.html" xml:lang="en">RHSA-2009:0451</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/503610/100/0/threaded" xml:lang="en">20090516 rPSA-2009-0084-1 kernel</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/507985/100/0/threaded" xml:lang="en">20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33951" xml:lang="en">33951</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1022153" xml:lang="en">1022153</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0016.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0016.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/3316" xml:lang="en">ADV-2009-3316</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487990" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487990</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49061" xml:lang="en">linux-kernel-auditsyscallentry-sec-bypass(49061)</vuln:reference>
    </vuln:references>
    <vuln:summary>The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0835">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.1::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.2::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.3::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.4::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.5::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.6::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.7::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.8::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.9::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.10::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.11::x86_64"/>
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.25.12::x86_64"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.1::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.2::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.3::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.4::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.5::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.6::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.7::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.8::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.9::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.10::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.11::x86_64</vuln:product>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.25.12::x86_64</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0835</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T06:30:02.657-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2012-03-19T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.6</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-06T12:50:00.000-05:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.html" xml:lang="en">SUSE-SA:2009:021</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" xml:lang="en">SUSE-SA:2009:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lkml.org/lkml/2009/2/28/23" xml:lang="en">[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123579056530191&amp;w=2" xml:lang="en">[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123579069630311&amp;w=2" xml:lang="en">[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=oss-security&amp;m=123597627132485&amp;w=2" xml:lang="en">[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-001.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-001.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scary.beasts.org/security/CESA-2009-004.html" xml:lang="en">http://scary.beasts.org/security/CESA-2009-004.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html" xml:lang="en">http://scarybeastsecurity.blogspot.com/2009/02/linux-kernel-minor-seccomp.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1800" xml:lang="en">DSA-1800</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:118" xml:lang="en">MDVSA-2009:118</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0451.html" xml:lang="en">RHSA-2009:0451</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33948" xml:lang="en">33948</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="https://bugzilla.redhat.com/show_bug.cgi?id=487255" xml:lang="en">https://bugzilla.redhat.com/show_bug.cgi?id=487255</vuln:reference>
    </vuln:references>
    <vuln:summary>The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0836">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:reader:2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:foxitsoftware:reader:3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxitsoftware:reader:2.3</vuln:product>
      <vuln:product>cpe:/a:foxitsoftware:reader:3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0836</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.577-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:39.440-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html" xml:lang="en">http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.immunitysec.com/pipermail/dailydave/2010-April/006079.html" xml:lang="en">[dailydave] 20100402 0day, it may not be</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/foxit-reader-vulnerabilities" xml:lang="en">http://www.coresecurity.com/content/foxit-reader-vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security.htm#bypass" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security.htm#bypass</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501623/100/0/threaded" xml:lang="en">20090309 Foxit Reader Multiple Vulnerabilities (CORE-2009-0218)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34035" xml:lang="en">34035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021824" xml:lang="en">1021824</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0634" xml:lang="en">ADV-2009-0634</vuln:reference>
    </vuln:references>
    <vuln:summary>Foxit Reader 2.3 before Build 3902 and 3.0 before Build 1506, including 1120 and 1301, does not require user confirmation before performing dangerous actions defined in a PDF file, which allows remote attackers to execute arbitrary programs and have unspecified other impact via a crafted file, as demonstrated by the "Open/Execute a file" action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0837">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:foxit:reader3.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:foxit:reader3.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0837</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.593-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:40.173-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.coresecurity.com/content/foxit-reader-vulnerabilities" xml:lang="en">http://www.coresecurity.com/content/foxit-reader-vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.foxitsoftware.com/pdf/reader/security.htm#Stackbased" xml:lang="en">http://www.foxitsoftware.com/pdf/reader/security.htm#Stackbased</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501623/100/0/threaded" xml:lang="en">20090309 Foxit Reader Multiple Vulnerabilities (CORE-2009-0218)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34035" xml:lang="en">34035</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021824" xml:lang="en">1021824</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0634" xml:lang="en">ADV-2009-0634</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49136" xml:lang="en">foxitreader-pdf-bo(49136)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in Foxit Reader 3.0 before Build 1506, including 1120 and 1301, allows remote attackers to execute arbitrary code via a long (1) relative path or (2) absolute path in the filename argument in an action, as demonstrated by the "Open/Execute a file" action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0838">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90:x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101b"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:sunos:5.10"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90:x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101b</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:sunos:5.10</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0838</vuln:cve-id>
    <vuln:published-datetime>2009-03-06T13:30:00.717-05:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-30T12:25:14.200-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5641" name="oval:org.mitre.oval:def:5641"/>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021810" xml:lang="en">1021810</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-139498-04-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-254088-1" xml:lang="en">254088</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-097.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34000" xml:lang="en">34000</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0606" xml:lang="en">ADV-2009-0606</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0815" xml:lang="en">ADV-2009-0815</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49105" xml:lang="en">sun-solaris-cryptodriver-dos(49105)</vuln:reference>
    </vuln:references>
    <vuln:summary>The crypto pseudo device driver in Sun Solaris 10, and OpenSolaris snv_88 through snv_102, does not properly free memory, which allows local users to cause a denial of service (panic) via unspecified vectors, related to the vmem_hash_delete function.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0839">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:umn:mapserver:4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.2:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0839</vuln:cve-id>
    <vuln:published-datetime>2009-03-31T14:24:45.827-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:40.923-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html" xml:lang="en">[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.osgeo.org/mapserver/ticket/2944" xml:lang="en">http://trac.osgeo.org/mapserver/ticket/2944</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1914" xml:lang="en">DSA-1914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.positronsecurity.com/advisories/2009-000.html" xml:lang="en">http://www.positronsecurity.com/advisories/2009-000.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502271/100/0/threaded" xml:lang="en">20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34306" xml:lang="en">34306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021952" xml:lang="en">1021952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html" xml:lang="en">FEDORA-2009-3357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html" xml:lang="en">FEDORA-2009-3383</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when the server has a map with a long IMAGEPATH or NAME attribute, allows remote attackers to execute arbitrary code via a crafted id parameter in a query action.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0840">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:umn:mapserver:4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.2:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0840</vuln:cve-id>
    <vuln:published-datetime>2009-03-31T14:24:45.860-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:41.987-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html" xml:lang="en">[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.osgeo.org/mapserver/ticket/2943" xml:lang="en">http://trac.osgeo.org/mapserver/ticket/2943</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1914" xml:lang="en">DSA-1914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.positronsecurity.com/advisories/2009-000.html" xml:lang="en">http://www.positronsecurity.com/advisories/2009-000.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502271/100/0/threaded" xml:lang="en">20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34306" xml:lang="en">34306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021952" xml:lang="en">1021952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49545" xml:lang="en">mapserver-contentlength-bo(49545)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html" xml:lang="en">FEDORA-2009-3357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html" xml:lang="en">FEDORA-2009-3383</vuln:reference>
    </vuln:references>
    <vuln:summary>Heap-based buffer underflow in the readPostBody function in cgiutil.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to have an unknown impact via a negative value in the Content-Length HTTP header.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0841">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:umn:mapserver:4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.2:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0841</vuln:cve-id>
    <vuln:published-datetime>2009-03-31T14:24:45.877-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:43.267-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html" xml:lang="en">[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.osgeo.org/mapserver/ticket/2942" xml:lang="en">http://trac.osgeo.org/mapserver/ticket/2942</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1914" xml:lang="en">DSA-1914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.positronsecurity.com/advisories/2009-000.html" xml:lang="en">http://www.positronsecurity.com/advisories/2009-000.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502271/100/0/threaded" xml:lang="en">20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34306" xml:lang="en">34306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021952" xml:lang="en">1021952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49548" xml:lang="en">mapserver-mapserv-dir-traversal(49548)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html" xml:lang="en">FEDORA-2009-3357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html" xml:lang="en">FEDORA-2009-3383</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in mapserv.c in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2, when running on Windows with Cygwin, allows remote attackers to create arbitrary files via a .. (dot dot) in the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0842">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:umn:mapserver:4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.2:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0842</vuln:cve-id>
    <vuln:published-datetime>2009-03-31T14:24:45.907-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:44.533-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html" xml:lang="en">[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.osgeo.org/mapserver/ticket/2941" xml:lang="en">http://trac.osgeo.org/mapserver/ticket/2941</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1914" xml:lang="en">DSA-1914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.positronsecurity.com/advisories/2009-000.html" xml:lang="en">http://www.positronsecurity.com/advisories/2009-000.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502271/100/0/threaded" xml:lang="en">20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34306" xml:lang="en">34306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021952" xml:lang="en">1021952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html" xml:lang="en">FEDORA-2009-3357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html" xml:lang="en">FEDORA-2009-3383</vuln:reference>
    </vuln:references>
    <vuln:summary>mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0843">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.4.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.6.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.8:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:4.10.3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:umn:mapserver:5.2.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:umn:mapserver:4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.2:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.4.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.6.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.8:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:4.10.3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta5</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:beta6</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta2</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta3</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:beta4</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.0:rc1</vuln:product>
      <vuln:product>cpe:/a:umn:mapserver:5.2.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0843</vuln:cve-id>
    <vuln:published-datetime>2009-03-31T14:24:45.920-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:45.597-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.osgeo.org/pipermail/mapserver-users/2009-March/060600.html" xml:lang="en">[mapserver-users] 20090326 MapServer 5.2.2 and 4.10.4 released with security fixes</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://trac.osgeo.org/mapserver/ticket/2939" xml:lang="en">http://trac.osgeo.org/mapserver/ticket/2939</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1914" xml:lang="en">DSA-1914</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.positronsecurity.com/advisories/2009-000.html" xml:lang="en">http://www.positronsecurity.com/advisories/2009-000.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502271/100/0/threaded" xml:lang="en">20090330 Positron Security Advisory #2009-000: Multiple Vulnerabilities in MapServer v5.2.1 and v4.10.3</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34306" xml:lang="en">34306</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021952" xml:lang="en">1021952</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00147.html" xml:lang="en">FEDORA-2009-3357</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00170.html" xml:lang="en">FEDORA-2009-3383</vuln:reference>
    </vuln:references>
    <vuln:summary>The msLoadQuery function in mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to determine the existence of arbitrary files via a full pathname in the queryfile parameter, which triggers different error messages depending on whether this pathname exists.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0844">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0844</vuln:cve-id>
    <vuln:published-datetime>2009-04-08T20:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:46.707-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6339" name="oval:org.mitre.oval:def:6339"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9474" name="oval:org.mitre.oval:def:9474"/>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-09.xml" xml:lang="en">GLSA-200904-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1" xml:lang="en">256728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/662091" xml:lang="en">VU#662091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:098" xml:lang="en">MDVSA-2009:098</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0408.html" xml:lang="en">RHSA-2009:0408</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502526/100/0/threaded" xml:lang="en">20090407 MITKRB5-SA-2009-001: multiple vulnerabilities in SPNEGO, ASN.1 decoder [CVE-2009-0844 CVE-2009-0845 CVE-2009-0847]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502546/100/0/threaded" xml:lang="en">20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34408" xml:lang="en">34408</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021867" xml:lang="en">1021867</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-755-1" xml:lang="en">USN-755-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0960" xml:lang="en">ADV-2009-0960</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0976" xml:lang="en">ADV-2009-0976</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1057" xml:lang="en">ADV-2009-1057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1106" xml:lang="en">ADV-2009-1106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2248" xml:lang="en">ADV-2009-2248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21396120" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21396120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html" xml:lang="en">FEDORA-2009-2834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html" xml:lang="en">FEDORA-2009-2852</vuln:reference>
    </vuln:references>
    <vuln:summary>The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0845">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0845</vuln:cve-id>
    <vuln:published-datetime>2009-03-27T12:30:02.157-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:52.237-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10044" name="oval:org.mitre.oval:def:10044"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6449" name="oval:org.mitre.oval:def:6449"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&amp;pass=guest&amp;id=6402" xml:lang="en">http://krbdev.mit.edu/rt/Ticket/Display.html?user=guest&amp;pass=guest&amp;id=6402</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-09.xml" xml:lang="en">GLSA-200904-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&amp;r2=22084" xml:lang="en">http://src.mit.edu/fisheye/browse/krb5/trunk/src/lib/gssapi/spnego/spnego_mech.c?r1=21875&amp;r2=22084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://src.mit.edu/fisheye/changelog/krb5/?cs=22084" xml:lang="en">http://src.mit.edu/fisheye/changelog/krb5/?cs=22084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1" xml:lang="en">256728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT-VN</vuln:source>
      <vuln:reference href="http://www.kb.cert.org/vuls/id/662091" xml:lang="en">VU#662091</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:082" xml:lang="en">MDVSA-2009:082</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0408.html" xml:lang="en">RHSA-2009:0408</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502526/100/0/threaded" xml:lang="en">20090407 MITKRB5-SA-2009-001: multiple vulnerabilities in SPNEGO, ASN.1 decoder [CVE-2009-0844 CVE-2009-0845 CVE-2009-0847]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502546/100/0/threaded" xml:lang="en">20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34257" xml:lang="en">34257</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021867" xml:lang="en">1021867</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-755-1" xml:lang="en">USN-755-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0847" xml:lang="en">ADV-2009-0847</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0976" xml:lang="en">ADV-2009-0976</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1057" xml:lang="en">ADV-2009-1057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1106" xml:lang="en">ADV-2009-1106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2248" xml:lang="en">ADV-2009-2248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21396120" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21396120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49448" xml:lang="en">kerberos-spnego-dos(49448)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html" xml:lang="en">FEDORA-2009-2834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html" xml:lang="en">FEDORA-2009-2852</vuln:reference>
    </vuln:references>
    <vuln:summary>The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0846">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.7"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.2.8"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3:alpha1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.3.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.4.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.4.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.4.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.4.4"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.5.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.2:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.2:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5_1.3.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.4</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.7</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.2.8</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3:alpha1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.4</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.3.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.4</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.4.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.4.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.4.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.4.4</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.5.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.0</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.0.6</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.1.1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.2:beta1</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.2:beta2</vuln:product>
      <vuln:product>cpe:/a:mit:kerberos:5_1.3.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0846</vuln:cve-id>
    <vuln:published-datetime>2009-04-08T20:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:31:59.003-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10694" name="oval:org.mitre.oval:def:10694"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5483" name="oval:org.mitre.oval:def:5483"/>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6301" name="oval:org.mitre.oval:def:6301"/>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://lists.vmware.com/pipermail/security-announce/2009/000059.html" xml:lang="en">[security-announce] 20090701 VMSA-2009-0008 ESX Service Console update for krb5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124896429301168&amp;w=2" xml:lang="en">HPSBUX02421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=130497213107107&amp;w=2" xml:lang="en">SSRT100495</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0409.html" xml:lang="en">RHSA-2009:0409</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://rhn.redhat.com/errata/RHSA-2009-0410.html" xml:lang="en">RHSA-2009:0410</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-09.xml" xml:lang="en">GLSA-200904-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1" xml:lang="en">256728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-002.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:098" xml:lang="en">MDVSA-2009:098</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>REDHAT</vuln:source>
      <vuln:reference href="http://www.redhat.com/support/errata/RHSA-2009-0408.html" xml:lang="en">RHSA-2009:0408</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502527/100/0/threaded" xml:lang="en">20090407 MITKRB5-SA-2009-002: ASN.1 decoder frees uninitialized pointer [CVE-2009-0846]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502546/100/0/threaded" xml:lang="en">20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/504683/100/0/threaded" xml:lang="en">20090701 VMSA-2009-0008 ESX Service Console update for krb5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34409" xml:lang="en">34409</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021994" xml:lang="en">1021994</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-755-1" xml:lang="en">USN-755-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.vmware.com/security/advisories/VMSA-2009-0008.html" xml:lang="en">http://www.vmware.com/security/advisories/VMSA-2009-0008.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0960" xml:lang="en">ADV-2009-0960</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0976" xml:lang="en">ADV-2009-0976</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1057" xml:lang="en">ADV-2009-1057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1106" xml:lang="en">ADV-2009-1106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2084" xml:lang="en">ADV-2009-2084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2248" xml:lang="en">ADV-2009-2248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21396120" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21396120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html" xml:lang="en">FEDORA-2009-2834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html" xml:lang="en">FEDORA-2009-2852</vuln:reference>
    </vuln:references>
    <vuln:summary>The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0847">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:mit:kerberos:5-1.6.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:mit:kerberos:5-1.6.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0847</vuln:cve-id>
    <vuln:published-datetime>2009-04-08T20:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:07.723-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:assessment_check system="http://oval.mitre.org/XMLSchema/oval-definitions-5" href="https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6387" name="oval:org.mitre.oval:def:6387"/>
    <vuln:cwe id="CWE-189"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>APPLE</vuln:source>
      <vuln:reference href="http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" xml:lang="en">APPLE-SA-2009-05-12</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>HP</vuln:source>
      <vuln:reference href="http://marc.info/?l=bugtraq&amp;m=124896429301168&amp;w=2" xml:lang="en">HPSBUX02421</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>GENTOO</vuln:source>
      <vuln:reference href="http://security.gentoo.org/glsa/glsa-200904-09.xml" xml:lang="en">GLSA-200904-09</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-26-256728-1" xml:lang="en">256728</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.apple.com/kb/HT3549" xml:lang="en">http://support.apple.com/kb/HT3549</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-142.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047180.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html" xml:lang="en">http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5047181.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt" xml:lang="en">http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2009-001.txt</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058" xml:lang="en">http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0058</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MANDRIVA</vuln:source>
      <vuln:reference href="http://www.mandriva.com/security/advisories?name=MDVSA-2009:098" xml:lang="en">MDVSA-2009:098</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502526/100/0/threaded" xml:lang="en">20090407 MITKRB5-SA-2009-001: multiple vulnerabilities in SPNEGO, ASN.1 decoder [CVE-2009-0844 CVE-2009-0845 CVE-2009-0847]</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/502546/100/0/threaded" xml:lang="en">20090407 rPSA-2009-0058-1 krb5 krb5-server krb5-services krb5-test krb5-workstation</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34408" xml:lang="en">34408</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021993" xml:lang="en">1021993</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-755-1" xml:lang="en">USN-755-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CERT</vuln:source>
      <vuln:reference href="http://www.us-cert.gov/cas/techalerts/TA09-133A.html" xml:lang="en">TA09-133A</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0960" xml:lang="en">ADV-2009-0960</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0976" xml:lang="en">ADV-2009-0976</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1057" xml:lang="en">ADV-2009-1057</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1106" xml:lang="en">ADV-2009-1106</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1297" xml:lang="en">ADV-2009-1297</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2084" xml:lang="en">ADV-2009-2084</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/2248" xml:lang="en">ADV-2009-2248</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21396120" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21396120</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00205.html" xml:lang="en">FEDORA-2009-2834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>FEDORA</vuln:source>
      <vuln:reference href="https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00206.html" xml:lang="en">FEDORA-2009-2852</vuln:reference>
    </vuln:references>
    <vuln:summary>The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0848">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.0"/>
        <cpe-lang:fact-ref name="cpe:/o:opensuse:opensuse:11.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:opensuse:opensuse:11.0</vuln:product>
      <vuln:product>cpe:/o:opensuse:opensuse:11.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0848</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.377-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.100-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.4</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html" xml:lang="en">SUSE-SR:2009:006</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49228" xml:lang="en">opensuse-gtk2-code-execution(49228)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path."</vuln:summary>
  </entry>
  <entry id="CVE-2009-0849">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:novastor:novanet:12"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:linux:linux"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:novastor:novanet:12</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0849</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T13:30:00.170-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.147-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://www.insight-tech.org/index.php?p=NovaNET-12-Remote-Buffer-Oveflow" xml:lang="en">http://www.insight-tech.org/index.php?p=NovaNET-12-Remote-Buffer-Oveflow</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33954" xml:lang="en">33954</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49074" xml:lang="en">novanet-dtbclslogin-bo(49074)</vuln:reference>
    </vuln:references>
    <vuln:summary>Stack-based buffer overflow in the DtbClsLogin function in NovaStor NovaNET 12 allows remote attackers to (1) execute arbitrary code on Linux platforms via a long username field during backup domain authentication, related to libnnlindtb.so; or (2) cause a denial of service (daemon crash) on Windows platforms via a long username field during backup domain authentication, related to nnwindtb.dll.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0850">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:bitdefender:internet_security:2009"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:bitdefender:internet_security:2009</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0850</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T13:30:00.187-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:12.787-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501277/100/0/threaded" xml:lang="en">20090226 BitDefender Internet Security XSS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501299/100/0/threaded" xml:lang="en">20090227 Re: BitDefender Internet Security XSS</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33921" xml:lang="en">33921</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0557" xml:lang="en">ADV-2009-0557</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in BitDefender Internet Security 2009 allows user-assisted remote attackers to inject arbitrary web script or HTML via the filename of a virus-infected file, as demonstrated by a filename inside a (1) rar or (2) zip archive file.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0851">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:stewart_howe:celerbb:0.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:stewart_howe:celerbb:0.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0851</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T13:30:00.217-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:13.300-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501481/100/0/threaded" xml:lang="en">20090305 CelerBB 0.0.2 Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34014" xml:lang="en">34014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8161" xml:lang="en">8161</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple SQL injection vulnerabilities in CelerBB 0.0.2, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the id parameter to (1) viewforum.php and (2) viewtopic.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0852">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:stewart_howe:celerbb:0.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:stewart_howe:celerbb:0.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0852</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T13:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:13.630-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501481/100/0/threaded" xml:lang="en">20090305 CelerBB 0.0.2 Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34014" xml:lang="en">34014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8161" xml:lang="en">8161</vuln:reference>
    </vuln:references>
    <vuln:summary>showme.php in CelerBB 0.0.2 allows remote attackers to obtain "reserved information" via the user parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0853">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:stewart_howe:celerbb:0.0.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:stewart_howe:celerbb:0.0.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0853</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T13:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:13.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_OTHER_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501481/100/0/threaded" xml:lang="en">20090305 CelerBB 0.0.2 Multiple Vulnerabilities</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34014" xml:lang="en">34014</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8161" xml:lang="en">8161</vuln:reference>
    </vuln:references>
    <vuln:summary>login.php in CelerBB 0.0.2, when magic_quotes_gpc is disabled, allows remote attackers to bypass authentication and obtain administrative access via special characters in the Username parameter, as demonstrated by an admin'# parameter value.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0854">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:dash:dash:0.5.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:dash:dash:0.5.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0854</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.390-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.223-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.9</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:security-protection>ALLOWS_ADMIN_ACCESS</vuln:security-protection>
    <vuln:cwe id="CWE-78"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34092" xml:lang="en">34092</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/USN-732-1" xml:lang="en">USN-732-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49216" xml:lang="en">dash-profile-code-execution(49216)</vuln:reference>
    </vuln:references>
    <vuln:summary>Untrusted search path vulnerability in dash 0.5.4, when used as a login shell, allows local users to execute arbitrary code via a Trojan horse .profile file in the current working directory.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0855">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.20"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
        <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.22"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.22</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0855</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-04-01T01:43:07.170-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34001" xml:lang="en">34001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34259" xml:lang="en">34259</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0607" xml:lang="en">ADV-2009-0607</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0854" xml:lang="en">ADV-2009-0854</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK77505" xml:lang="en">PK77505</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212" xml:lang="en">PK81212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK82988" xml:lang="en">PK82988</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.23 on z/OS allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0856">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.1"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.2"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.3"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.4"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.5"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.6"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.7"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.8"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.9"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.10"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.11"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.12"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.13"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.14"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.15"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.16"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.17"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.18"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.19"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.20"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.21"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:websphere_application_server:6.1.0.22"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:ibm:z%2fos"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.1</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.2</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.3</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.4</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.5</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.6</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.7</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.8</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.9</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.10</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.11</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.12</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.13</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.14</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.15</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.16</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.17</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.18</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.19</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.20</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.21</vuln:product>
      <vuln:product>cpe:/a:ibm:websphere_application_server:6.1.0.22</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0856</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-05T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-10T11:59:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021811" xml:lang="en">1021811</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34001" xml:lang="en">34001</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0607" xml:lang="en">ADV-2009-0607</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/1464" xml:lang="en">ADV-2009-1464</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>AIXAPAR</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg1PK81212" xml:lang="en">PK81212</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg27006876" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg27006876</vuln:reference>
    </vuln:references>
    <vuln:summary>Multiple cross-site scripting (XSS) vulnerabilities in sample applications in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35, and 6.1 before 6.1.0.23 on z/OS, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0857">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:sun:management_center:3.6.1"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris:8::sparc"/>
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris:9::sparc"/>
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::sparc"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:sun:management_center:4.0"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:sun:management_center:3.6.1</vuln:product>
      <vuln:product>cpe:/a:sun:management_center:4.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0857</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.297-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.303-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021809" xml:lang="en">1021809</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-125191-04-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-125191-04-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-247046-1" xml:lang="en">247046</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33999" xml:lang="en">33999</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0605" xml:lang="en">ADV-2009-0605</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49076" xml:lang="en">sunmc-performancereportingmodule-xss(49076)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in /prm/reports in the Performance Reporting Module (PRM) for Sun Management Center (SunMC) 3.6.1 and 4.0 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.  NOTE: this can be leveraged for access to the SunMC Web Console.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0858">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:d.j.bernstein:djbdns:1.05"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:d.j.bernstein:djbdns:1.05</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0858</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:14.317-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://it.slashdot.org/article.pl?sid=09/03/05/2014249" xml:lang="en">http://it.slashdot.org/article.pl?sid=09/03/05/2014249</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=djbdns&amp;m=123554945710038" xml:lang="en">[dns] 20090225 djbdns misformats some long response packets; patch and example</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=djbdns&amp;m=123613000920446&amp;w=2" xml:lang="en">[dns] 20090304 djbdns&lt;=1.05 lets AXFRed subdomains overwrite domains</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>MISC</vuln:source>
      <vuln:reference href="http://securityandthe.net/2009/03/05/security-issue-in-djbdns-confirmed/" xml:lang="en">http://securityandthe.net/2009/03/05/security-issue-in-djbdns-confirmed/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1831" xml:lang="en">DSA-1831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501294/100/0/threaded" xml:lang="en">20090226 djbdns misformats some long response packets; patch and example attack</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501340/100/0/threaded" xml:lang="en">20090228 Re: djbdns misformats some long response packets; patch and example attack</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501479/100/0/threaded" xml:lang="en">20090305 Re: djbdns misformats some long response packets; patch and example attack</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33937" xml:lang="en">33937</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49003" xml:lang="en">djbdns-response-packet-spoofing(49003)</vuln:reference>
    </vuln:references>
    <vuln:summary>The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0859">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:2.6.28.4"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:2.6.28.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0859</vuln:cve-id>
    <vuln:published-datetime>2009-03-09T17:30:00.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.443-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a68e61e8ff2d46327a37b69056998b47745db6fa" xml:lang="en">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a68e61e8ff2d46327a37b69056998b47745db6fa</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5" xml:lang="en">http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html" xml:lang="en">SUSE-SA:2009:028</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html" xml:lang="en">SUSE-SA:2009:030</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SUSE</vuln:source>
      <vuln:reference href="http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" xml:lang="en">SUSE-SA:2009:031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=git-commits-head&amp;m=123387479500599&amp;w=2" xml:lang="en">[git-commits-head] 20090205 shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=120428209704324&amp;w=2" xml:lang="en">[linux-kernel] 20080229 [BUG] soft lockup detected with ipcs</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://marc.info/?l=linux-kernel&amp;m=123309645625549&amp;w=2" xml:lang="en">[linux-kernel] 20090127 [PATCH 1/2] fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>MLIST</vuln:source>
      <vuln:reference href="http://openwall.com/lists/oss-security/2009/03/06/1" xml:lang="en">[oss-security] 20090306 CVE request: kernel: shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://patchwork.kernel.org/patch/6554/" xml:lang="en">http://patchwork.kernel.org/patch/6554/</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1787" xml:lang="en">DSA-1787</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1794" xml:lang="en">DSA-1794</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>DEBIAN</vuln:source>
      <vuln:reference href="http://www.debian.org/security/2009/dsa-1800" xml:lang="en">DSA-1800</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34020" xml:lang="en">34020</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>UBUNTU</vuln:source>
      <vuln:reference href="http://www.ubuntu.com/usn/usn-751-1" xml:lang="en">USN-751-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49229" xml:lang="en">linux-kernel-shmgetstat-dos(49229)</vuln:reference>
    </vuln:references>
    <vuln:summary>The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0860">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:netcordia:netmri:3.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:netcordia:netmri:3.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0860</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.203-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:15.397-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://connection.netcordia.com/forums/t/731.aspx" xml:lang="en">http://connection.netcordia.com/forums/t/731.aspx</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501033/100/0/threaded" xml:lang="en">20090218 DDIVRT-2009-20 NetMRI Login Application Cross-site Scripting Vulnerability</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33824" xml:lang="en">33824</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the web user interface in the login application in NetMRI 3.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to error pages.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0861">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:0.9.3"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:0.9.4"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.0.0:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.0.0:rc2"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.0.0:rc3"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:denorastats:phpdenora:1.2.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:denorastats:phpdenora:0.9.3</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:0.9.4</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.0.0</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.0.0:rc1</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.0.0:rc2</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.0.0:rc3</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.0.1</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.1.0</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.1.1</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.2.0</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.2.1</vuln:product>
      <vuln:product>cpe:/a:denorastats:phpdenora:1.2.2</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0861</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.233-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.507-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sourceforge.net/project/shownotes.php?release_id=661189" xml:lang="en">http://sourceforge.net/project/shownotes.php?release_id=661189</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33822" xml:lang="en">33822</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48799" xml:lang="en">phpdenora-ircchannel-xss(48799)</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in phpDenora before 1.2.3 allows remote attackers to inject arbitrary web script or HTML via an IRC channel name.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0862">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:1.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:1.0.8"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:1.0.8.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.4"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.0.6"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.1.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.1.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.1.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.2.1"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.2.2"/>
        <cpe-lang:fact-ref name="cpe:/a:tangocms:tangocms:2.2.3"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:tangocms:tangocms:1.0.6</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:1.0.8</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:1.0.8.1</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.0</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.1</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.2</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.3</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.4</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.5</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.0.6</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.1.0</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.1.1</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.1.2</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.2.0</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.2.1</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.2.2</vuln:product>
      <vuln:product>cpe:/a:tangocms:tangocms:2.2.3</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0862</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.250-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-03-21T01:55:06.110-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.3</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-79"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tangocms.org/article/view/2.2.4-released" xml:lang="en">http://tangocms.org/article/view/2.2.4-released</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://tangocms.org/changelog" xml:lang="en">http://tangocms.org/changelog</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33833" xml:lang="en">33833</vuln:reference>
    </vuln:references>
    <vuln:summary>Cross-site scripting (XSS) vulnerability in the hook_cntrlr_error_output function in modules/page/hooks/listeners.php in the admincp component in TangoCMS 2.2.x (aka Eagle) before 2.2.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: some of these details are obtained from third party information.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0863">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:matteoiammarrone:s-cms:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:matteoiammarrone:s-cms:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0863</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.267-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:04.637-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-89"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33799" xml:lang="en">33799</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48806" xml:lang="en">scms-deletepage-sql-injection(48806)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8071" xml:lang="en">8071</vuln:reference>
    </vuln:references>
    <vuln:summary>SQL injection vulnerability in admin/delete_page.php in S-Cms 1.1 Stable allows remote attackers to execute arbitrary SQL commands via the id parameter.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0864">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:matteoiammarrone:s-cms:1.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:matteoiammarrone:s-cms:1.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0864</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.280-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:04.687-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>7.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-287"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33799" xml:lang="en">33799</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48805" xml:lang="en">scms-cookie-security-bypass(48805)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8071" xml:lang="en">8071</vuln:reference>
    </vuln:references>
    <vuln:summary>S-Cms 1.1 Stable allows remote attackers to bypass authentication and obtain administrative access via an OK value for the login cookie.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0865">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:geovision:livex_activex_control:8.1.2.0"/>
        <cpe-lang:fact-ref name="cpe:/a:geovision:livex_activex_control:8.2.0.0"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:geovision:livex_activex_control:8.1.2.0</vuln:product>
      <vuln:product>cpe:/a:geovision:livex_activex_control:8.2.0.0</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0865</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.313-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-10-18T21:30:18.223-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>8.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-22"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33782" xml:lang="en">33782</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48773" xml:lang="en">geovision-livex-activex-file-overwrite(48773)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8059" xml:lang="en">8059</vuln:reference>
    </vuln:references>
    <vuln:summary>Directory traversal vulnerability in the SnapShotToFile method in the GeoVision LiveX (aka LiveX_v8200) ActiveX control 8.1.2 and 8.2.0 in LIVEX_~1.OCX allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the argument, possibly involving the PlayX and SnapShotX methods.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0866">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:phnews:phnews:1:alpha"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:phnews:phnews:1:alpha</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0866</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.327-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-09-28T21:34:04.763-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-264"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48801" xml:lang="en">phnews-genbackup-info-disclosure(48801)</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>EXPLOIT-DB</vuln:source>
      <vuln:reference href="https://www.exploit-db.com/exploits/8073" xml:lang="en">8073</vuln:reference>
    </vuln:references>
    <vuln:summary>pHNews Alpha 1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for extra/genbackup.php.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0867">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:enhanced_support_facility:3.0"/>
        <cpe-lang:fact-ref name="cpe:/a:fujitsu:enhanced_support_facility:3.0.1"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fujitsu:enhanced_support_facility:3.0</vuln:product>
      <vuln:product>cpe:/a:fujitsu:enhanced_support_facility:3.0.1</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0867</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.343-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.803-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>5.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>NONE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-200"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html" xml:lang="en">http://www.fujitsu.com/global/support/software/security/products-f/esf-200901e.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33831" xml:lang="en">33831</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48817" xml:lang="en">fujitsu-enhanced-hrms-info-disclosure(48817)</vuln:reference>
    </vuln:references>
    <vuln:summary>The HRM-S service in Fujitsu Enhanced Support Facility 3.0 and 3.0.1 allows remote attackers to obtain (1) hardware and (2) software information via unspecified requests in a client connection.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0868">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:fujitsu:jasmine2000::enterprise"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:sun:solaris:7"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:fujitsu:jasmine2000::enterprise</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0868</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T10:30:00.360-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.880-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>6.8</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>PARTIAL</cvss:confidentiality-impact>
        <cvss:integrity-impact>PARTIAL</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www.fujitsu.com/global/support/software/security/products-f/jasmine-200901e.html" xml:lang="en">http://www.fujitsu.com/global/support/software/security/products-f/jasmine-200901e.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/33832" xml:lang="en">33832</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/48818" xml:lang="en">jasmine2000-weblink-response-splitting(48818)</vuln:reference>
    </vuln:references>
    <vuln:summary>CRLF injection vulnerability in the WebLink template in Fujitsu Jasmine2000 Enterprise Edition allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0869">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="AND" negate="false">
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.3.2.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.3.5.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.4.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.4.2.5"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.5.0.0"/>
          <cpe-lang:fact-ref name="cpe:/a:ibm:tivoli_storage_manager_hsm:5.5.1.4"/>
        </cpe-lang:logical-test>
        <cpe-lang:logical-test operator="OR" negate="false">
          <cpe-lang:fact-ref name="cpe:/o:microsoft:windows"/>
        </cpe-lang:logical-test>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.3.2.0</vuln:product>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.3.5.0</vuln:product>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.4.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.4.2.5</vuln:product>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.5.0.0</vuln:product>
      <vuln:product>cpe:/a:ibm:tivoli_storage_manager_hsm:5.5.1.4</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0869</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.610-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2009-06-17T00:00:00.000-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>10.0</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>LOW</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>COMPLETE</cvss:confidentiality-impact>
        <cvss:integrity-impact>COMPLETE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
        <cvss:generated-on-datetime>2009-03-11T10:09:00.000-04:00</cvss:generated-on-datetime>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-119"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021820" xml:lang="en">1021820</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34034" xml:lang="en">34034</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0638" xml:lang="en">ADV-2009-0638</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://www-01.ibm.com/support/docview.wss?uid=swg21329223" xml:lang="en">http://www-01.ibm.com/support/docview.wss?uid=swg21329223</vuln:reference>
    </vuln:references>
    <vuln:summary>Buffer overflow in the client in IBM Tivoli Storage Manager (TSM) HSM 5.3.2.0 through 5.3.5.0, 5.4.0.0 through 5.4.2.5, and 5.5.0.0 through 5.5.1.4 on Windows allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0870">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_108::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_109::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_110::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10.0::sparc"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_108::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_109::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_110::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10.0::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_108::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_108::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_109::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_109::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_110::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_110::x86</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10.0::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:solaris:10.0::x86</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0870</vuln:cve-id>
    <vuln:published-datetime>2009-03-10T16:30:06.640-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2017-08-16T21:30:03.957-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>4.7</cvss:score>
        <cvss:access-vector>LOCAL</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>NONE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>COMPLETE</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-399"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://securitytracker.com/id?1021819" xml:lang="en">1021819</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-21-139462-02-1" xml:lang="en">http://sunsolve.sun.com/search/document.do?assetkey=1-21-139462-02-1</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>SUNALERT</vuln:source>
      <vuln:reference href="http://sunsolve.sun.com/search/document.do?assetkey=1-66-252469-1" xml:lang="en">252469</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://support.avaya.com/elmodocs2/security/ASA-2009-090.htm" xml:lang="en">http://support.avaya.com/elmodocs2/security/ASA-2009-090.htm</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34031" xml:lang="en">34031</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0635" xml:lang="en">ADV-2009-0635</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0765" xml:lang="en">ADV-2009-0765</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>XF</vuln:source>
      <vuln:reference href="https://exchange.xforce.ibmcloud.com/vulnerabilities/49133" xml:lang="en">solaris-nfsv4-hsfs-dos(49133)</vuln:reference>
    </vuln:references>
    <vuln:summary>The NFSv4 Server module in the kernel in Sun Solaris 10, and OpenSolaris before snv_111, allow local users to cause a denial of service (infinite loop and system hang) by accessing an hsfs filesystem that is shared through NFSv4, related to the rfs4_op_readdir function.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0871">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.4.22"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.4.23"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.4.23.1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta5"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta6"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta7"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta7.1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta8"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:beta9"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:rc4"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:rc5"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0:rc6"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.2"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.3"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.3:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.4:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.0.5"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1:beta1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1:beta2"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1:beta3"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1:beta4"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:1.6.1:rc1"/>
        <cpe-lang:fact-ref name="cpe:/a:digium:asterisk:c.2.3:-:business"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/a:digium:asterisk:1.4.22</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.4.23</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.4.23.1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta2</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta3</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta4</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta5</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta6</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta7</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta7.1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta8</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:beta9</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:rc4</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:rc5</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0:rc6</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.2</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.3</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.3:rc1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.4:rc1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.0.5</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1:beta1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1:beta2</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1:beta3</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1:beta4</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:1.6.1:rc1</vuln:product>
      <vuln:product>cpe:/a:digium:asterisk:c.2.3:-:business</vuln:product>
    </vuln:vulnerable-software-list>
    <vuln:cve-id>CVE-2009-0871</vuln:cve-id>
    <vuln:published-datetime>2009-03-11T10:19:15.420-04:00</vuln:published-datetime>
    <vuln:last-modified-datetime>2018-10-10T15:32:15.740-04:00</vuln:last-modified-datetime>
    <vuln:cvss>
      <cvss:base_metrics>
        <cvss:score>3.5</cvss:score>
        <cvss:access-vector>NETWORK</cvss:access-vector>
        <cvss:access-complexity>MEDIUM</cvss:access-complexity>
        <cvss:authentication>SINGLE_INSTANCE</cvss:authentication>
        <cvss:confidentiality-impact>NONE</cvss:confidentiality-impact>
        <cvss:integrity-impact>NONE</cvss:integrity-impact>
        <cvss:availability-impact>PARTIAL</cvss:availability-impact>
        <cvss:source>http://nvd.nist.gov</cvss:source>
      </cvss:base_metrics>
    </vuln:cvss>
    <vuln:cwe id="CWE-20"/>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.digium.com/view.php?id=13547" xml:lang="en">http://bugs.digium.com/view.php?id=13547</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://bugs.digium.com/view.php?id=14417" xml:lang="en">http://bugs.digium.com/view.php?id=14417</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="VENDOR_ADVISORY">
      <vuln:source>CONFIRM</vuln:source>
      <vuln:reference href="http://downloads.digium.com/pub/security/AST-2009-002.html" xml:lang="en">http://downloads.digium.com/pub/security/AST-2009-002.html</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>BUGTRAQ</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/archive/1/501656/100/0/threaded" xml:lang="en">20090310 AST-2009-002: Remote Crash Vulnerability in SIP channel driver</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="PATCH">
      <vuln:source>BID</vuln:source>
      <vuln:reference href="http://www.securityfocus.com/bid/34070" xml:lang="en">34070</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>SECTRACK</vuln:source>
      <vuln:reference href="http://www.securitytracker.com/id?1021834" xml:lang="en">1021834</vuln:reference>
    </vuln:references>
    <vuln:references xml:lang="en" reference_type="UNKNOWN">
      <vuln:source>VUPEN</vuln:source>
      <vuln:reference href="http://www.vupen.com/english/advisories/2009/0667" xml:lang="en">ADV-2009-0667</vuln:reference>
    </vuln:references>
    <vuln:summary>The SIP channel driver in Asterisk Open Source 1.4.22, 1.4.23, and 1.4.23.1; 1.6.0 before 1.6.0.6; 1.6.1 before 1.6.1.0-rc2; and Asterisk Business Edition C.2.3, with the pedantic option enabled, allows remote authenticated users to cause a denial of service (crash) via a SIP INVITE request without any headers, which triggers a NULL pointer dereference in the (1) sip_uri_headers_cmp and (2) sip_uri_params_cmp functions.</vuln:summary>
  </entry>
  <entry id="CVE-2009-0872">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_108::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_109::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_110::x86"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:solaris:10::x86"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_01::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_02::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_03::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_04::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_05::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_06::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_07::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_08::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_09::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_10::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_11::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_12::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_13::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_14::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_15::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_16::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_17::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_18::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_19::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_20::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_21::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_22::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_23::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_24::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_25::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_26::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_27::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_28::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_29::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_30::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_31::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_32::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_33::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_34::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_35::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_36::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_37::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_38::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_39::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_40::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_41::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_42::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_43::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_44::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_45::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_46::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_47::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_48::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_49::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_50::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_51::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_52::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_53::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_54::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_55::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_56::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_57::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_58::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_59::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_60::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_61::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_62::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_63::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_64::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_65::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_66::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_67::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_68::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_69::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_70::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_71::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_72::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_73::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_74::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_75::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_76::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_77::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_78::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_79::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_80::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_81::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_82::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_83::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_84::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_85::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_86::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_87::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_88::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_89::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_90::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_91::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_92::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_93::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_94::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_95::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_96::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_97::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_98::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_99::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_100::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_101::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_102::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_103::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_104::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_105::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_106::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_107::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_108::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_109::sparc"/>
        <cpe-lang:fact-ref name="cpe:/o:sun:opensolaris:snv_110::sparc"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_01::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_02::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_03::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_04::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_05::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_06::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_07::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_08::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_09::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_10::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_11::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_12::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_13::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_14::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_15::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_16::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_17::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_18::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_19::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_20::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_21::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_22::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_23::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_24::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_25::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_26::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_27::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_28::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_29::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_30::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_31::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_32::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_33::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_34::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_35::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_36::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_37::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_38::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_39::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_40::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_41::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_42::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_43::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_44::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_45::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_46::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_47::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_48::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_49::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_50::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_51::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_52::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_53::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_54::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_55::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_56::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_57::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_58::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_59::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_60::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_61::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_62::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_63::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_64::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_65::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_66::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_67::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_68::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_69::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_70::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_71::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_72::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_73::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_74::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_75::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_76::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_77::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_78::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_79::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_80::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_81::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_82::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_83::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_84::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_85::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_86::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_87::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_88::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_89::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_90::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_91::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_92::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_93::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_94::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_95::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_96::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_97::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_98::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_99::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_100::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_101::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_102::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_103::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_104::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_105::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::sparc</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_106::x86</vuln:product>
      <vuln:product>cpe:/o:sun:opensolaris:snv_107::sparc</vuln:product>
   